]> git.baikalelectronics.ru Git - kernel.git/commit
bridge: Avoid infinite loop when suppressing NS messages with invalid options
authorIdo Schimmel <idosch@mellanox.com>
Mon, 1 Jun 2020 12:58:54 +0000 (15:58 +0300)
committerDavid S. Miller <davem@davemloft.net>
Mon, 1 Jun 2020 18:08:41 +0000 (11:08 -0700)
commita296742b7f19ac0169f010461c9ac9ea23e91c4d
tree1ed1493cf2db8509b8ff0461c69a0b9135752613
parent69b849c240040b8105c02a14dc8a911dc943ffbf
bridge: Avoid infinite loop when suppressing NS messages with invalid options

When neighbor suppression is enabled the bridge device might reply to
Neighbor Solicitation (NS) messages on behalf of remote hosts.

In case the NS message includes the "Source link-layer address" option
[1], the bridge device will use the specified address as the link-layer
destination address in its reply.

To avoid an infinite loop, break out of the options parsing loop when
encountering an option with length zero and disregard the NS message.

This is consistent with the IPv6 ndisc code and RFC 4886 which states
that "Nodes MUST silently discard an ND packet that contains an option
with length zero" [2].

[1] https://tools.ietf.org/html/rfc4861#section-4.3
[2] https://tools.ietf.org/html/rfc4861#section-4.6

Fixes: 18a6b4eb33d5 ("bridge: suppress nd pkts on BR_NEIGH_SUPPRESS ports")
Signed-off-by: Ido Schimmel <idosch@mellanox.com>
Reported-by: Alla Segal <allas@mellanox.com>
Tested-by: Alla Segal <allas@mellanox.com>
Acked-by: Nikolay Aleksandrov <nikolay@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/bridge/br_arp_nd_proxy.c