Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2026:20452-1

Опубликовано: 01 апр. 2026
Источник: suse-cvrf

Описание

Security update for kea

This update for kea fixes the following issues:

Update to 3.0.3:

  • CVE-2025-11232: invalid characters cause assert (bsc#1252863).
  • CVE-2026-3608: stack overflow via maliciously crafted message (bsc#1260380).

Changelog:

  • A large number of bracket pairs in a JSON payload directed to any endpoint would result in a stack overflow, due to recursive calls when parsing the JSON. This has been fixed. (CVE-2026-3608) [bsc#1260380]
  • When a hostname or FQDN received from a client is reduced to an empty string by hostname sanitizing, kea-dhcp4 and kea-dhcp6 will now drop the option. (CVE-2025-11232) [bsc#1252863]
  • A null dereference is now no longer possible when configuring the Control Agent with a socket that lacks the mandatory socket-name entry.
  • UNIX sockets are now created as group-writable.
  • Removed logging an error in ping check hook library if using lease cache treshold.
  • Fixed deadlock in ping-check hooks library.
  • Fixed a data race in ping-check hooks library.

Список пакетов

openSUSE Leap 16.0
kea-3.0.3-160000.1.1
kea-devel-3.0.3-160000.1.1
kea-doc-3.0.3-160000.1.1
kea-hooks-3.0.3-160000.1.1
libkea-asiodns62-3.0.3-160000.1.1
libkea-asiolink88-3.0.3-160000.1.1
libkea-cc83-3.0.3-160000.1.1
libkea-cfgrpt3-3.0.3-160000.1.1
libkea-config84-3.0.3-160000.1.1
libkea-cryptolink64-3.0.3-160000.1.1
libkea-d2srv63-3.0.3-160000.1.1
libkea-database76-3.0.3-160000.1.1
libkea-dhcp109-3.0.3-160000.1.1
libkea-dhcp_ddns68-3.0.3-160000.1.1
libkea-dhcpsrv131-3.0.3-160000.1.1
libkea-dns71-3.0.3-160000.1.1
libkea-eval84-3.0.3-160000.1.1
libkea-exceptions45-3.0.3-160000.1.1
libkea-hooks121-3.0.3-160000.1.1
libkea-http87-3.0.3-160000.1.1
libkea-log-interprocess3-3.0.3-160000.1.1
libkea-log75-3.0.3-160000.1.1
libkea-mysql88-3.0.3-160000.1.1
libkea-pgsql88-3.0.3-160000.1.1
libkea-process91-3.0.3-160000.1.1
libkea-stats53-3.0.3-160000.1.1
libkea-tcp33-3.0.3-160000.1.1
libkea-util-io12-3.0.3-160000.1.1
libkea-util102-3.0.3-160000.1.1
python3-kea-3.0.3-160000.1.1

Описание

To trigger the issue, three configuration parameters must have specific settings: "hostname-char-set" must be left at the default setting, which is "[^A-Za-z0-9.-]"; "hostname-char-replacement" must be empty (the default); and "ddns-qualifying-suffix" must *NOT* be empty (the default is empty). DDNS updates do not need to be enabled for this issue to manifest. A client that sends certain option content would then cause kea-dhcp4 to exit unexpectedly. This issue affects Kea versions 3.0.1 through 3.0.1 and 3.1.1 through 3.1.2.


Затронутые продукты
openSUSE Leap 16.0:kea-3.0.3-160000.1.1
openSUSE Leap 16.0:kea-devel-3.0.3-160000.1.1
openSUSE Leap 16.0:kea-doc-3.0.3-160000.1.1
openSUSE Leap 16.0:kea-hooks-3.0.3-160000.1.1

Ссылки

Описание

Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, or kea-dhcp6 daemons over any configured API socket or HA listener can cause the receiving daemon to exit with a stack overflow error. This issue affects Kea versions 2.6.0 through 2.6.4 and 3.0.0 through 3.0.2.


Затронутые продукты
openSUSE Leap 16.0:kea-3.0.3-160000.1.1
openSUSE Leap 16.0:kea-devel-3.0.3-160000.1.1
openSUSE Leap 16.0:kea-doc-3.0.3-160000.1.1
openSUSE Leap 16.0:kea-hooks-3.0.3-160000.1.1

Ссылки