Drop bogus IPv6 messages
Drop IPv6 message shorter than what's mentioned in the payload length header (+ the size of the IPv6 header). They're invalid an could lead to data leakage in icmp6_send_echoreply().
This is an alternative fix to !42 (closed) (+ also addresses the MTU comment raised there)