NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

kern/58646: /dev/random, kern.entropy.*: signal bugs



>Number:         58646
>Category:       kern
>Synopsis:       /dev/random, kern.entropy.*: signal bugs
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    kern-bug-people
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Mon Aug 26 10:10:00 +0000 2024
>Originator:     Taylor R Campbell
>Release:        current, 10
>Organization:
The NentropyBSigD Foundation
>Environment:
>Description:
1. If a long write to /dev/random is interrupted by a signal, it may proceed to sleep on the entropy source lock instead of returning promptly.
2. If a write to /dev/random is interrupted by a signal while sleeping on the entropy source lock, it may fail to report EINTR.
3. If `sysctl -w kern.entropy.consolidate=1' is interrupted by a signal, it may fail to report EINTR.
4. If ioctl(RNDCTL) is interrupted by a signal, it may fail to report EINTR.
>How-To-Repeat:
randomly randomize randomness and signals
>Fix:
Yes, please!



Home | Main Index | Thread Index | Old Index