An issue was discovered in FRRouting FRR (aka Free Range Routing) through 7.3.1. When using the split-config feature, the init script creates an empty config file with world-readable default permissions, leading to a possible information leak via tools/frr.in and tools/frrcommon.sh.in. NOTE: some parties consider this user error, not a vulnerability, because the permissions are under the control of the user before any sensitive information is present in the file
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Free_range_routing | Linuxfoundation | * | 7.3.1 (including) |
Red Hat Enterprise Linux 8 | RedHat | frr-0:7.0-10.el8 | * |
Frr | Ubuntu | eoan | * |
Frr | Ubuntu | groovy | * |
Frr | Ubuntu | hirsute | * |
Frr | Ubuntu | trusty | * |