[OpenWrt-Devel] ipv6 dos (bongos/CVE-2015-2922)

Steven Barth cyrus at openwrt.org
Fri Apr 10 08:02:19 EDT 2015

Thanks for the hint. I added some sanitizing to odhcp6c and made odhcpd 
send out explicit hop-limit values so unfixed clients can recover 
automatically once an attacker is removed.

Since we don't use the kernel's RA handling I'm not sure as to how much 
it makes sense to backport the Linux patches as well.


openwrt-devel mailing list
openwrt-devel at lists.openwrt.org

More information about the openwrt-devel mailing list