Hide Forgot
In ndp_msg_check_opts() in libndp/libndp.c, this code is used to parse the option header: uint8_t cur_opt_raw_type = ptr[0]; uint8_t cur_opt_len = ptr[1] << 3; /* convert to bytes */ The type of cur_opt_len is incorrect, it should be unsigned, so that large values are not clipped. With the current code, libndp parsing gets out of sync with the payload and subsequent options are not recognized. In addition, RFC 2461 requires that packets with zero-length options are silently discarded. The code merely stops options processing at the first zero-length option.
ndp_msg_next_opt_offset() has the same problem.
fixed upstream: https://github.com/jpirko/libndp/commit/41876d610802747316e2d05f2c48d80126e4c8ae https://github.com/jpirko/libndp/commit/38fd5157e1f97585bb4da35b5ead611824766aa9
This request was resolved in Red Hat Enterprise Linux 7.0. Contact your manager or support representative in case you have further questions about the request.