Back to bug 1330000
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Florian Weimer | 2016-04-25 09:16:25 UTC | See Also | https://bugzilla.redhat.com/show_bug.cgi?id=1298643 | |
| Florian Weimer | 2016-04-25 09:16:53 UTC | Sub Component | Security Other | Crypto |
| Assignee | kernel-mgr | herbert.xu | ||
| Herbert Xu | 2016-04-25 09:18:16 UTC | Status | NEW | ASSIGNED |
| Hubert Kario | 2016-04-25 10:38:23 UTC | CC | hkario | |
| Nick Coghlan | 2016-06-23 17:14:29 UTC | CC | ncoghlan | |
| Nick Coghlan | 2016-06-23 17:15:12 UTC | See Also | https://bugzilla.redhat.com/show_bug.cgi?id=1326218 | |
| Florian Weimer | 2016-09-08 11:27:39 UTC | Group | private | |
| Florian Weimer | 2016-09-08 11:27:47 UTC | Blocks | 1374268 | |
| Robbie Harwood | 2016-09-12 17:45:22 UTC | CC | rharwood | |
| Tomas Orsava | 2016-09-16 12:35:07 UTC | CC | torsava | |
| Tomas Mraz | 2016-10-24 08:48:44 UTC | CC | tmraz | |
| Linqing Lu | 2016-11-14 06:34:36 UTC | Blocks | 1394638 | |
| Robbie Harwood | 2016-11-14 17:06:21 UTC | Blocks | 1394908 | |
| Herbert Xu | 2016-11-18 16:58:55 UTC | Status | ASSIGNED | POST |
| Bruno Goncalves | 2016-12-05 10:26:53 UTC | QA Contact | kernel-qe | kernel-general-qe |
| Stanislav Zidek | 2016-12-07 09:12:58 UTC | CC | szidek | |
| Stanislav Zidek | 2016-12-07 09:41:24 UTC | CC | herbert.xu | |
| Flags | needinfo?(herbert.xu) | |||
| Herbert Xu | 2016-12-07 09:47:15 UTC | Flags | needinfo?(herbert.xu) | |
| Stanislav Zidek | 2016-12-07 09:56:58 UTC | CC | ksrot | |
| Chao Ye | 2016-12-09 08:20:10 UTC | CC | cye | |
| QA Contact | kernel-general-qe | cye | ||
| Linqing Lu | 2016-12-13 15:14:01 UTC | Blocks | 1404314 | |
| Rafael Aquini | 2017-01-17 14:00:14 UTC | Status | POST | MODIFIED |
| Rafael Aquini | 2017-01-18 13:32:42 UTC | Fixed In Version | kernel-3.10.0-544.el7 | |
| errata-xmlrpc | 2017-01-18 13:34:24 UTC | Status | MODIFIED | ON_QA |
| Stanislav Zidek | 2017-01-19 09:42:35 UTC | CC | szidek | |
| Josh Boyer | 2017-03-14 15:51:02 UTC | CC | jwboyer | |
| John Shortt | 2017-03-14 19:36:50 UTC | Blocks | 1432218 | |
| Mark Flitter | 2017-03-16 14:36:50 UTC | Blocks | 1433000 | |
| Mark Flitter | 2017-03-16 14:43:54 UTC | Blocks | 1433000 | |
| Lenka Špačková | 2017-04-11 15:16:18 UTC | Docs Contact | mdolezel | |
| Marie Hornickova | 2017-04-25 11:35:30 UTC | Doc Text | The kernel now contains the getrandom system call This update adds the getrandom system call to the kernel. As a result, the resiliance against file descriptor exhaustion attacks has been increased, and the kernel can now request randomness from the /dev/urandom entropy pool, but to block until at least 128 bits of entropy has been accumulated in the /dev/urandom entropy pool. | |
| Doc Type | Bug Fix | Enhancement | ||
| Marie Hornickova | 2017-04-25 11:39:31 UTC | Flags | needinfo?(herbert.xu) | |
| Herbert Xu | 2017-04-26 09:53:54 UTC | Flags | needinfo?(herbert.xu) | |
| Marie Hornickova | 2017-04-26 11:06:10 UTC | Doc Text | The kernel now contains the getrandom system call This update adds the getrandom system call to the kernel. As a result, the resiliance against file descriptor exhaustion attacks has been increased, and the kernel can now request randomness from the /dev/urandom entropy pool, but to block until at least 128 bits of entropy has been accumulated in the /dev/urandom entropy pool. | getrandom added to the Linux kernel on AMD64 and Intel 64 This update adds the getrandom system call to the Linux kernel on AMD64 and Intel 64 architectures. As a result, the kernel can now request randomness from the same non-blocking entropy pool used by /dev/urandom, and the kernel can block (what?) until at least 128 bits of entropy has been accumulated in that pool. |
| Marie Hornickova | 2017-04-26 11:11:43 UTC | Flags | needinfo?(herbert.xu) | |
| Herbert Xu | 2017-04-26 14:41:45 UTC | Flags | needinfo?(herbert.xu) | |
| Marie Hornickova | 2017-05-03 09:31:09 UTC | Doc Text | getrandom added to the Linux kernel on AMD64 and Intel 64 This update adds the getrandom system call to the Linux kernel on AMD64 and Intel 64 architectures. As a result, the kernel can now request randomness from the same non-blocking entropy pool used by /dev/urandom, and the kernel can block (what?) until at least 128 bits of entropy has been accumulated in that pool. | getrandom added to the Linux kernel on AMD64 and Intel 64 This update adds the getrandom system call to the Linux kernel on AMD64 and Intel 64 architectures. As a result, the user-space can now request randomness from the same non-blocking entropy pool used by /dev/urandom, and the user-space can block until at least 128 bits of entropy has been accumulated in that pool. |
| Marie Hornickova | 2017-05-03 09:34:04 UTC | Flags | needinfo?(herbert.xu) | |
| Herbert Xu | 2017-05-03 12:11:17 UTC | Flags | needinfo?(herbert.xu) | |
| Marie Hornickova | 2017-05-15 09:51:22 UTC | Doc Text | getrandom added to the Linux kernel on AMD64 and Intel 64 This update adds the getrandom system call to the Linux kernel on AMD64 and Intel 64 architectures. As a result, the user-space can now request randomness from the same non-blocking entropy pool used by /dev/urandom, and the user-space can block until at least 128 bits of entropy has been accumulated in that pool. | getrandom added to the Linux kernel on AMD64 and Intel 64 This update adds the getrandom system call to the Linux kernel on AMD64 and Intel 64 architectures. As a result, the user space can now request randomness from the same non-blocking entropy pool used by /dev/urandom, and the user space can block until at least 128 bits of entropy has been accumulated in that pool. |
| Marie Hornickova | 2017-05-16 14:57:14 UTC | Doc Text | getrandom added to the Linux kernel on AMD64 and Intel 64 This update adds the getrandom system call to the Linux kernel on AMD64 and Intel 64 architectures. As a result, the user space can now request randomness from the same non-blocking entropy pool used by /dev/urandom, and the user space can block until at least 128 bits of entropy has been accumulated in that pool. | `getrandom` added to the Linux kernel on AMD64 and Intel 64 This update adds the `getrandom` system call to the Linux kernel on AMD64 and Intel 64 architectures. As a result, the user space can now request randomness from the same non-blocking entropy pool used by /dev/urandom, and the user space can block until at least 128 bits of entropy has been accumulated in that pool. |
| Chao Ye | 2017-05-27 07:37:29 UTC | Status | ON_QA | VERIFIED |
| errata-xmlrpc | 2017-08-01 01:30:09 UTC | Status | VERIFIED | RELEASE_PENDING |
| errata-xmlrpc | 2017-08-01 20:10:04 UTC | Status | RELEASE_PENDING | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2017-08-01 16:10:04 UTC |
Back to bug 1330000