Bug 1669297

Summary: radvd: Use After Free in case of misconfiguration
Product: [Other] Security Response Reporter: Laura Pardo <lpardo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-03-04 05:23:24 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1669298    
Bug Blocks: 1669299    

Description Laura Pardo 2019-01-24 21:14:22 UTC
A flaw was found in radvd. In case of misconfiguration a race condition between privsep and main thread occurs. This leads to double-free and crashing of radvd.


References:
https://github.com/reubenhwk/radvd/issues/100
https://bugzilla.redhat.com/show_bug.cgi?id=1630167
https://bugzilla.redhat.com/show_bug.cgi?id=1668812

Upstream Patch:
https://github.com/reubenhwk/radvd/pull/101

Comment 1 Laura Pardo 2019-01-24 21:14:54 UTC
Created radvd tracking bugs for this issue:

Affects: fedora-all [bug 1669298]

Comment 2 Doran Moppert 2019-03-04 05:23:24 UTC
In general, mis-handling of incorrect configuration files does not constitute a security vulnerability.  The configuration file for radvd (and most daemons) is trusted input provided by the administrator.

The bugs referenced in comment#0 track the fixing of this issue in radvd.  No security handling is required.