NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
kern/58646: /dev/random, kern.entropy.*: signal bugs
>Number: 58646
>Category: kern
>Synopsis: /dev/random, kern.entropy.*: signal bugs
>Confidential: no
>Severity: serious
>Priority: medium
>Responsible: kern-bug-people
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Mon Aug 26 10:10:00 +0000 2024
>Originator: Taylor R Campbell
>Release: current, 10
>Organization:
The NentropyBSigD Foundation
>Environment:
>Description:
1. If a long write to /dev/random is interrupted by a signal, it may proceed to sleep on the entropy source lock instead of returning promptly.
2. If a write to /dev/random is interrupted by a signal while sleeping on the entropy source lock, it may fail to report EINTR.
3. If `sysctl -w kern.entropy.consolidate=1' is interrupted by a signal, it may fail to report EINTR.
4. If ioctl(RNDCTL) is interrupted by a signal, it may fail to report EINTR.
>How-To-Repeat:
randomly randomize randomness and signals
>Fix:
Yes, please!
Home |
Main Index |
Thread Index |
Old Index