[OpenWrt-Devel] ipv6 dos (bongos/CVE-2015-2922)
cyrus at openwrt.org
Fri Apr 10 08:02:19 EDT 2015
Thanks for the hint. I added some sanitizing to odhcp6c and made odhcpd
send out explicit hop-limit values so unfixed clients can recover
automatically once an attacker is removed.
Since we don't use the kernel's RA handling I'm not sure as to how much
it makes sense to backport the Linux patches as well.
openwrt-devel mailing list
openwrt-devel at lists.openwrt.org
More information about the openwrt-devel