Date: Thu, 25 May 2017 12:30:39 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-security@FreeBSD.org Subject: [Bug 219527] Flawed umask handling in /etc/rc.d/random Message-ID: <bug-219527-5710@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D219527 Bug ID: 219527 Summary: Flawed umask handling in /etc/rc.d/random Product: Base System Version: 11.0-STABLE Hardware: Any OS: Any Status: New Keywords: regression Severity: Affects Many People Priority: --- Component: misc Assignee: freebsd-bugs@FreeBSD.org Reporter: fk@fabiankeil.de CC: freebsd-security@FreeBSD.org Lu Tung-Pin reported on freebsd-current@ a couple of months ago: | A 2014 change broke the umask handling in /etc/rc.d/random, | leaving /entropy with ug+r permissions. Quick fix attached, | mirroring random_stop() behavior. https://lists.freebsd.org/pipermail/freebsd-current/2017-January/064602.html A couple of patch improvements were suggested but none of them were committed. It would be great if one of the proposed fixes would make it into 11.1. I've been using the original version of the patch since January and can confirm that it works as advertised. --=20 You are receiving this mail because: You are on the CC list for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-219527-5710>