CVE-2025-11232

To trigger the issue, three configuration parameters must have specific settings: "hostname-char-set" must be left at the default setting, which is "[^A-Za-z0-9.-]"; "hostname-char-replacement" must be empty (the default); and "ddns-qualifying-suffix" must *NOT* be empty (the default is empty). DDNS updates do not need to be enabled for this issue to manifest. A client that sends certain option content would then cause kea-dhcp4 to exit unexpectedly. This issue affects Kea versions 3.0.1 through 3.0.1 and 3.1.1 through 3.1.2.
Configurations

No configuration.

History

04 Nov 2025, 22:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/10/29/5 -

29 Oct 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-29 18:15

Updated : 2025-11-04 22:16


NVD link : CVE-2025-11232

Mitre link : CVE-2025-11232

CVE.ORG link : CVE-2025-11232


JSON object : View

Products Affected

No product.

CWE
CWE-823

Use of Out-of-range Pointer Offset