[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <cover.1670890407.git.david.keisarschm@mail.huji.ac.il>
Date: Tue, 13 Dec 2022 12:34:56 +0200
From: david.keisarschm@...l.huji.ac.il
To: linux-kernel@...r.kernel.org
Cc: David <david.keisarschm@...l.huji.ac.il>, aksecurity@...il.com,
ilay.bahat1@...il.com
Subject: [PATCH v2 0/3] Replace invocations of prandom_u32_state, prandom_bytes_state with get_random_u32, get_random_bytes
From: David <david.keisarschm@...l.huji.ac.il>
The security improvements for prandom_u32 done specifically in
commits c51f8f88d705e06bd696d7510aff22b33eb8e638 from October 2020
and d4150779e60fb6c49be25572596b2cdfc5d46a09 from May 2022)
didn't handle the cases when prandom_bytes_state() and prandom_u32_state()
are used. We have now added the necessary changes to handle
these cases as well.
David (3):
Replace invocation of weak PRNG in mm/slab.c
Replace invocation of weak PRNG inside mm/slab_common.c
Replace invocation of weak PRNG in arch/x86/mm/kaslr.c
arch/x86/mm/kaslr.c | 5 +----
mm/slab.c | 20 ++++++++------------
mm/slab_common.c | 10 +++-------
3 files changed, 12 insertions(+), 23 deletions(-)
--
2.38.0
Powered by blists - more mailing lists