OpenBSD slaacd/rad daemons: infinite loop via crafted ICMPv6 ND option (len 0)
CVE-2026-41285 Published on April 20, 2026
In OpenBSD through 7.8, the slaacd and rad daemons have an infinite loop when they receive a crafted ICMPv6 Neighbor Discovery (ND) option (over a local network) with length zero, because of an "nd_opt_len * 8 - 2" expression with no preceding check for whether nd_opt_len is zero.
Weakness Type
Improper Validation of Specified Quantity in Input
The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.
Products Associated with CVE-2026-41285
Want to know whenever a new CVE is published for OpenBSD? stack.watch will email you.
Affected Versions
OpenBSD:- Before and including 7.8 is affected.