Source: isc-kea
Version: 1.5.0-2
Severity: grave
Tags: security upstream

Hi,

The following vulnerabilities were published for isc-kea.

CVE-2019-6472[0]:
|A packet containing a malformed DUID can cause the kea-dhcp6 server to
|terminate

CVE-2019-6473[1]:
|An invalid hostname option can cause the kea-dhcp4 server to terminate

CVE-2019-6474[2]:
|An oversight when validating incoming client requests can lead to a
|situation where the Kea server will exit when trying to restart

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-6472
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6472
[1] https://security-tracker.debian.org/tracker/CVE-2019-6473
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6473
[2] https://security-tracker.debian.org/tracker/CVE-2019-6474
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6474

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to