Red Hat Bugzilla – Bug 34295
Last modified: 2014-03-16 22:20:07 EDT
when seeing /etc/issue and /etc/issue.net with -rw-rw-rw- privileges I
found that the umask is set to 0 when the script rc.local is executed. I
mean that is a very dangerous umask. Everything created within the startup
scripts will be privileded with 666. Have a look within /var what a bunch
of files will have -rw-rw-rw-. Not very secure...
I can't reproduce this here. /etc/issue* has 644 permissions.
It look's like a kernel issue: Please reproduce with the stock 2.4.3 kernel and
see what the umask within rc.local ist. Here I got good umask with the rawhide
kernel 2.4.2-0.1.28 and the bad one when exchanging it with the vanilla 2.4.3
Hm, this should probably actually be patched in init.
someone should try and reproduce this inhouse.
(Disregard that last comment. Too many windows open.)
This was patched into the init that shipped with 7.1.
AFAIK, the kernel change has been reverted since then anyway.