It was discovered that NetworkManager would set device MTUs based on MTU values received in IPv6 RAs (Router Advertisements), without sanity checking the MTU value first. A remote attacker could exploit this flaw to create a denial of service attack, by sending a specially crafted IPv6 RA packet to disturb IPv6 communication.
It was reported  that it's possible to craft a Router Advertisement message which will bring the receiver in a state where new IPv6 connections will not be accepted until correct Router Advertisement message received.
The referenced other report seems restricted. Is there any more information you can share on CVE-2015-0272 (e.g. affected versions, fixing commit)?
Created NetworkManager tracking bugs for this issue:
Affects: fedora-all [bug 1260931]
It was discovered that NetworkManager would set device MTUs based on the MTU values received in IPv6 RAs (Router Advertisements), without checking the MTU value for sanity first. A remote attacker could exploit this attack to disturb IPv6 communication by sending a specially crafted IPv6 RA packet.
There's also a patch for the kernel to harden against invalid MTUs (the file to set the MTU is root owned, though):
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Via RHSA-2015:2315 https://rhn.redhat.com/errata/RHSA-2015-2315.html