Описание
Security update for kea
This update for kea fixes the following issues:
Update to 3.0.3:
- CVE-2025-11232: invalid characters cause assert (bsc#1252863).
- CVE-2026-3608: stack overflow via maliciously crafted message (bsc#1260380).
Changelog:
- A large number of bracket pairs in a JSON payload directed to any endpoint would result in a stack overflow, due to recursive calls when parsing the JSON. This has been fixed. (CVE-2026-3608) [bsc#1260380]
- When a hostname or FQDN received from a client is reduced to an empty string by hostname sanitizing, kea-dhcp4 and kea-dhcp6 will now drop the option. (CVE-2025-11232) [bsc#1252863]
- A null dereference is now no longer possible when configuring the Control Agent with a socket that lacks the mandatory socket-name entry.
- UNIX sockets are now created as group-writable.
- Removed logging an error in ping check hook library if using lease cache treshold.
- Fixed deadlock in ping-check hooks library.
- Fixed a data race in ping-check hooks library.
Список пакетов
openSUSE Leap 16.0
Ссылки
- SUSE Security Ratings
- SUSE Bug 1252863
- SUSE Bug 1260380
- SUSE CVE CVE-2025-11232 page
- SUSE CVE CVE-2026-3608 page
Описание
To trigger the issue, three configuration parameters must have specific settings: "hostname-char-set" must be left at the default setting, which is "[^A-Za-z0-9.-]"; "hostname-char-replacement" must be empty (the default); and "ddns-qualifying-suffix" must *NOT* be empty (the default is empty). DDNS updates do not need to be enabled for this issue to manifest. A client that sends certain option content would then cause kea-dhcp4 to exit unexpectedly. This issue affects Kea versions 3.0.1 through 3.0.1 and 3.1.1 through 3.1.2.
Затронутые продукты
Ссылки
- CVE-2025-11232
- SUSE Bug 1252863
Описание
Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, or kea-dhcp6 daemons over any configured API socket or HA listener can cause the receiving daemon to exit with a stack overflow error. This issue affects Kea versions 2.6.0 through 2.6.4 and 3.0.0 through 3.0.2.
Затронутые продукты
Ссылки
- CVE-2026-3608
- SUSE Bug 1260380