[OpenWrt-Devel] ipv6 dos (bongos/CVE-2015-2922)

Steven Barth cyrus at openwrt.org
Fri Apr 10 08:02:19 EDT 2015


Thanks for the hint. I added some sanitizing to odhcp6c and made odhcpd 
send out explicit hop-limit values so unfixed clients can recover 
automatically once an attacker is removed.

Since we don't use the kernel's RA handling I'm not sure as to how much 
it makes sense to backport the Linux patches as well.


Cheers,

Steven
_______________________________________________
openwrt-devel mailing list
openwrt-devel at lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel



More information about the openwrt-devel mailing list