Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 22 Dec 2025 15:17:49 -0500
From:      mike tancsa <mike@sentex.net>
To:        "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>
Subject:   FreeBSD-SA-25:12.rtsold.asc clarification needed
Message-ID:  <a4d9a76b-3812-475e-9f2f-b885c5f5960a@sentex.net>

index | next in thread | raw e-mail

[-- Attachment #1 --]
Just trying to better understand this issue as it says no work around is 
available yet if ipv6 is disabled, this seems like a work around ?

No workaround is available.  Users not using IPv6, and IPv6 users that do not
configure the system to accept router advertisement messages, are not affected.
A network interface listed by ifconfig(8) accepts router advertisement messages
if the string "ACCEPT_RTADV" is present in the nd6 option list.


The issue seems to be in userland with the patch being
--- usr.sbin/rtsold/rtsol.c.orig
+++ usr.sbin/rtsold/rtsol.c

And more specifically, to be vulnerable, does rtsold need to be actually running ? Or does the program get called by the kernel somehow. ie. I need
rtsold_enable="YES" in /etc/rc.conf
and seeing
ACCEPT_RTADV
in ifconfig is not actually sufficient to be vulnerable to this ?

Is patching the userland daemon enough ? It seems to be

"Restart the applicable daemons, or reboot the system."


     ---Mike

[-- Attachment #2 --]
<!DOCTYPE html>
<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <p>Just trying to better understand this issue as it says no work
      around is available yet if ipv6 is disabled, this seems like a
      work around ? </p>
    <pre
style="color: rgb(0, 0, 0); font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; overflow-wrap: break-word; white-space: pre-wrap;">No workaround is available.  Users not using IPv6, and IPv6 users that do not
configure the system to accept router advertisement messages, are not affected.
A network interface listed by ifconfig(8) accepts router advertisement messages
if the string "ACCEPT_RTADV" is present in the nd6 option list.


The issue seems to be in userland with the patch being
--- usr.sbin/rtsold/rtsol.c.orig
+++ usr.sbin/rtsold/rtsol.c

And more specifically, to be vulnerable, does rtsold need to be actually running ? Or does the program get called by the kernel somehow. ie. I need 
rtsold_enable="YES" in /etc/rc.conf
and seeing 
ACCEPT_RTADV
in ifconfig is not actually sufficient to be vulnerable to this ?

Is patching the userland daemon enough ? It seems to be

"Restart the applicable daemons, or reboot the system."</pre>
    <p><br>
    </p>
    <p>    ---Mike</p>
  </body>
</html>
home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?a4d9a76b-3812-475e-9f2f-b885c5f5960a>