[OpenWrt-Devel] ipv6 dos (bongos/CVE-2015-2922)
Steven Barth
cyrus at openwrt.org
Fri Apr 10 08:02:19 EDT 2015
Thanks for the hint. I added some sanitizing to odhcp6c and made odhcpd
send out explicit hop-limit values so unfixed clients can recover
automatically once an attacker is removed.
Since we don't use the kernel's RA handling I'm not sure as to how much
it makes sense to backport the Linux patches as well.
Cheers,
Steven
_______________________________________________
openwrt-devel mailing list
openwrt-devel at lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel
More information about the openwrt-devel
mailing list