From owner-freebsd-bugs@freebsd.org Thu May 25 12:30:39 2017 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8FA5BD80C29 for ; Thu, 25 May 2017 12:30:39 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 7F531128F for ; Thu, 25 May 2017 12:30:39 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id v4PCUdiv075667 for ; Thu, 25 May 2017 12:30:39 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 219527] Flawed umask handling in /etc/rc.d/random Date: Thu, 25 May 2017 12:30:39 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: misc X-Bugzilla-Version: 11.0-STABLE X-Bugzilla-Keywords: regression X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: fk@fabiankeil.de X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status keywords bug_severity priority component assigned_to reporter cc Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 25 May 2017 12:30:39 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D219527 Bug ID: 219527 Summary: Flawed umask handling in /etc/rc.d/random Product: Base System Version: 11.0-STABLE Hardware: Any OS: Any Status: New Keywords: regression Severity: Affects Many People Priority: --- Component: misc Assignee: freebsd-bugs@FreeBSD.org Reporter: fk@fabiankeil.de CC: freebsd-security@FreeBSD.org Lu Tung-Pin reported on freebsd-current@ a couple of months ago: | A 2014 change broke the umask handling in /etc/rc.d/random, | leaving /entropy with ug+r permissions. Quick fix attached, | mirroring random_stop() behavior. https://lists.freebsd.org/pipermail/freebsd-current/2017-January/064602.html A couple of patch improvements were suggested but none of them were committed. It would be great if one of the proposed fixes would make it into 11.1. I've been using the original version of the patch since January and can confirm that it works as advertised. --=20 You are receiving this mail because: You are the assignee for the bug.=