I needed to recreate my systemd-boot’s EFI boot entry in an oldish system converted from Grub.
I did a sudo bootctl install and I got the output here below:
Copied "/usr/lib/systemd/boot/efi/systemd-bootx64.efi" to "/efi/EFI/systemd/systemd-bootx64.efi".
Copied "/usr/lib/systemd/boot/efi/systemd-bootx64.efi" to "/efi/EFI/BOOT/BOOTX64.EFI".
⚠️ Mount point '/efi' which backs the random seed file is world accessible, which is a security hole! ⚠️
⚠️ Random seed file '/efi/loader/random-seed' is world accessible, which is a security hole! ⚠️
Random seed file /efi/loader/random-seed successfully refreshed (32 bytes).
Created EFI boot entry "Linux Boot Manager".
I have done a quick search in www but I haven’t found anything related to these warnings.
Does anyone know what these are about and how I could fix it?
drwxr-xr-x 8 root root 4096 Jan 1 1970 efi
ls -al /efi/loader/
total 24
drwxr-xr-x 3 root root 4096 Aug 1 22:27 .
drwxr-xr-x 8 root root 4096 Jan 1 1970 ..
drwxr-xr-x 2 root root 4096 Jun 16 19:22 entries
-rwxr-xr-x 1 root root 6 Sep 15 2022 entries.srel
-rwxr-xr-x 1 root root 71 Apr 26 20:47 loader.conf
-rwxr-xr-x 1 root root 32 Aug 1 22:27 random-seed
I executed the two chmod commands.
I ran the bootctl install once again to test.
I’m still getting:
⚠️ Mount point '/efi' which backs the random seed file is world accessible, which is a security hole! ⚠️
⚠️ Random seed file '/efi/loader/random-seed' is world accessible, which is a security hole! ⚠️