Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 25 May 2017 12:30:39 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-security@FreeBSD.org
Subject:   [Bug 219527] Flawed umask handling in /etc/rc.d/random
Message-ID:  <bug-219527-5710@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D219527

            Bug ID: 219527
           Summary: Flawed umask handling in /etc/rc.d/random
           Product: Base System
           Version: 11.0-STABLE
          Hardware: Any
                OS: Any
            Status: New
          Keywords: regression
          Severity: Affects Many People
          Priority: ---
         Component: misc
          Assignee: freebsd-bugs@FreeBSD.org
          Reporter: fk@fabiankeil.de
                CC: freebsd-security@FreeBSD.org

Lu Tung-Pin reported on freebsd-current@ a couple of months ago:

| A 2014 change broke the umask handling in /etc/rc.d/random,
| leaving /entropy with ug+r permissions. Quick fix attached,
| mirroring random_stop() behavior.
https://lists.freebsd.org/pipermail/freebsd-current/2017-January/064602.html

A couple of patch improvements were suggested but none
of them were committed.

It would be great if one of the proposed fixes would make it into 11.1.

I've been using the original version of the patch since January and can
confirm that it works as advertised.

--=20
You are receiving this mail because:
You are on the CC list for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-219527-5710>