Description: remote DoS using IPv6 RA with bogus MTU References: - http://article.gmane.org/gmane.linux.network/351269 - https://bugzilla.redhat.com/show_bug.cgi?id=1192132 Notes: We originally used CVE-2015-0272 for this issue as well, but whose scope was actually for NetworkManager only. Bugs: upstream: released (4.0-rc3) [77751427a1ff25b27d47a4c36b12c3c8667855ac] 3.16-upstream-stable: released (3.16.7-ckt18) 3.2-upstream-stable: released (3.2.72) [ipv6-addrconf-validate-new-mtu-before-applying-it.patch] 2.6.32-upstream-stable: released (2.6.32.69) sid: released (4.0.2-1) 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u4) [bugfix/all/ipv6-addrconf-validate-new-MTU-before-applying-it.patch] 3.2-wheezy-security: released (3.2.68-1+deb7u4) [bugfix/all/ipv6-addrconf-validate-new-MTU-before-applying-it.patch] 2.6.32-squeeze-security: released (2.6.32-48squeeze14) [bugfix/all/ipv6-addrconf-validate-new-MTU-before-applying-it.patch]