CVE-2026-3608 Affecting kea-doc package, versions <0:3.0.1-3.el10_1


Severity

Recommended
0.0
high
0
10

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE10-KEADOC-16032458
  • published14 Apr 2026
  • disclosed25 Mar 2026

Introduced: 25 Mar 2026

CVE-2026-3608  (opens in a new tab)

How to fix?

Upgrade Oracle:10 kea-doc to version 0:3.0.1-3.el10_1 or higher.
This issue was patched in ELSA-2026-7342.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kea-doc package and not the kea-doc package as distributed by Oracle. See How to fix? for Oracle:10 relevant fixed versions and status.

Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, or kea-dhcp6 daemons over any configured API socket or HA listener can cause the receiving daemon to exit with a stack overflow error. This issue affects Kea versions 2.6.0 through 2.6.4 and 3.0.0 through 3.0.2.

CVSS Base Scores

version 3.1