SB2020021927 - Fedora EPEL 7 update for kea



SB2020021927 - Fedora EPEL 7 update for kea

Published: February 19, 2020 Updated: April 25, 2025

Security Bulletin ID SB2020021927
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Adjecent network
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Reachable Assertion (CVE-ID: CVE-2019-6472)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

A packet containing a malformed DUID can cause the Kea DHCPv6 server process (kea-dhcp6) to exit due to an assertion failure. Versions affected: 1.4.0 to 1.5.0, 1.6.0-beta1, and 1.6.0-beta2.


2) Reachable Assertion (CVE-ID: CVE-2019-6473)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

An invalid hostname option can trigger an assertion failure in the Kea DHCPv4 server process (kea-dhcp4), causing the server process to exit. Versions affected: 1.4.0 to 1.5.0, 1.6.0-beta1, and 1.6.0-beta2.


3) Input validation error (CVE-ID: CVE-2019-6474)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

A missing check on incoming client requests can be exploited to cause a situation where the Kea server's lease storage contains leases which are rejected as invalid when the server tries to load leases from storage on restart. If the number of such leases exceeds a hard-coded limit in the Kea code, a server trying to restart will conclude that there is a problem with its lease store and give up. Versions affected: 1.4.0 to 1.5.0, 1.6.0-beta1, and 1.6.0-beta2


Remediation

Install update from vendor's website.