aboutsummaryrefslogtreecommitdiffstats
path: root/net
diff options
context:
space:
mode:
authorLinus Lüssing <linus.luessing@web.de>2014-03-03 21:57:35 -0500
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2014-04-14 09:42:15 -0400
commit47c044663922c0671a04df426c48b444a9a3a50d (patch)
tree5db0a71cca98d93a0f70ee8e6d2916958f04a328 /net
parentec494e10043dc71f30b9f32a9db15a6c2a9ae051 (diff)
bridge: multicast: add sanity check for query source addresses
[ Upstream commit 6565b9eeef194afbb3beec80d6dd2447f4091f8c ] MLD queries are supposed to have an IPv6 link-local source address according to RFC2710, section 4 and RFC3810, section 5.1.14. This patch adds a sanity check to ignore such broken MLD queries. Without this check, such malformed MLD queries can result in a denial of service: The queries are ignored by any MLD listener therefore they will not respond with an MLD report. However, without this patch these malformed MLD queries would enable the snooping part in the bridge code, potentially shutting down the according ports towards these hosts for multicast traffic as the bridge did not learn about these listeners. Reported-by: Jan Stancek <jstancek@redhat.com> Signed-off-by: Linus Lüssing <linus.luessing@web.de> Reviewed-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'net')
-rw-r--r--net/bridge/br_multicast.c6
1 files changed, 6 insertions, 0 deletions
diff --git a/net/bridge/br_multicast.c b/net/bridge/br_multicast.c
index 2a180a380181..81de0106528b 100644
--- a/net/bridge/br_multicast.c
+++ b/net/bridge/br_multicast.c
@@ -1176,6 +1176,12 @@ static int br_ip6_multicast_query(struct net_bridge *br,
1176 1176
1177 br_multicast_query_received(br, port, !ipv6_addr_any(&ip6h->saddr)); 1177 br_multicast_query_received(br, port, !ipv6_addr_any(&ip6h->saddr));
1178 1178
1179 /* RFC2710+RFC3810 (MLDv1+MLDv2) require link-local source addresses */
1180 if (!(ipv6_addr_type(&ip6h->saddr) & IPV6_ADDR_LINKLOCAL)) {
1181 err = -EINVAL;
1182 goto out;
1183 }
1184
1179 if (skb->len == sizeof(*mld)) { 1185 if (skb->len == sizeof(*mld)) {
1180 if (!pskb_may_pull(skb, sizeof(*mld))) { 1186 if (!pskb_may_pull(skb, sizeof(*mld))) {
1181 err = -EINVAL; 1187 err = -EINVAL;