• Bug#1106737: isc-kea: CVE-2025-32801 CVE-2025-32802 CVE-2025-32803

    From Salvatore Bonaccorso@21:1/5 to Salvatore Bonaccorso on Wed May 28 23:40:01 2025
    On Wed, May 28, 2025 at 11:34:13PM +0200, Salvatore Bonaccorso wrote:
    [...]
    While at least CVE-2025-32801 is a nonissue in Debian context as the
    daemon does not as root, cf. the detailed writeup at [3], it might be
    still a good idea to have isc-kea patched/rebased to 2.6.2 for Debian
    trixie.

    Should be 2.6.3 above.

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Salvatore Bonaccorso@21:1/5 to All on Wed May 28 23:40:02 2025
    Source: isc-kea
    Version: 2.6.1-2
    Severity: important
    Tags: security upstream
    X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

    Hi,

    The following vulnerabilities were published for isc-kea.

    CVE-2025-32801[0]:
    | Kea configuration and API directives can be used to load a malicious
    | hook library. Many common configurations run Kea as root, leave the
    | API entry points unsecured by default, and/or place the control
    | sockets in insecure paths. This issue affects Kea versions 2.4.0
    | through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.


    CVE-2025-32802[1]:
    | Kea configuration and API directives can be used to overwrite
    | arbitrary files, subject to permissions granted to Kea. Many common
    | configurations run Kea as root, leave the API entry points unsecured
    | by default, and/or place the control sockets in insecure paths. This
    | issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2,
    | and 2.7.0 through 2.7.8.


    CVE-2025-32803[2]:
    | In some cases, Kea log files or lease files may be world-readable.
    | This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through
    | 2.6.2, and 2.7.0 through 2.7.8.

    While at least CVE-2025-32801 is a nonissue in Debian context as the
    daemon does not as root, cf. the detailed writeup at [3], it might be
    still a good idea to have isc-kea patched/rebased to 2.6.2 for Debian
    trixie.

    If you fix the vulnerabilities please also make sure to include the
    CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

    For further information see:

    [0] https://security-tracker.debian.org/tracker/CVE-2025-32801
    https://www.cve.org/CVERecord?id=CVE-2025-32801
    [1] https://security-tracker.debian.org/tracker/CVE-2025-32802
    https://www.cve.org/CVERecord?id=CVE-2025-32802
    [2] https://security-tracker.debian.org/tracker/CVE-2025-32803
    https://www.cve.org/CVERecord?id=CVE-2025-32803
    [3] https://www.openwall.com/lists/oss-security/2025/05/28/8

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)