Permalink
CVE-2026-3608
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Stack overflow in Kea daemons
Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, or kea-dhcp6 daemons over any configured API socket or HA listener can cause the receiving daemon to exit with a stack overflow error. This issue affects Kea versions 2.6.0 through 2.6.4 and 3.0.0 through 3.0.2.
References
Affected products
Kea
- =<3.0.2
- =<2.6.4
Matching in nixpkgs
pkgs.kea
High-performance, extensible DHCP server by ISC
pkgs.keama
Kea Migration Assistent
pkgs.speakeasy-cli
CLI tool for Speakeasy
pkgs.elmPackages.elm-graphql
Autogenerate type-safe GraphQL queries in Elm
Package maintainers
-
@PedroHLC Pedro Lara Campos <root@pedrohlc.com>
-
@fpletz Franz Pletz <fpletz@fnordicwalking.de>
-
@mweinelt Martin Weinelt <hexa@darmstadt.ccc.de>
-
@blitz Julian Stecklina <js@alien8.de>
-
@Eveeifyeve Eveeifyeve <eveeg1971@gmail.com>