DEBIAN-CVE-2025-58457

Source
https://security-tracker.debian.org/tracker/CVE-2025-58457
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-58457.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-58457
Upstream
Published
2025-09-24T10:15:28Z
Modified
2025-10-05T04:25:16.757221Z
Summary
[none]
Details

Improper permission check in ZooKeeper AdminServer lets authorized clients to run snapshot and restore command with insufficient permissions. This issue affects Apache ZooKeeper: from 3.9.0 before 3.9.4. Users are recommended to upgrade to version 3.9.4, which fixes the issue. The issue can be mitigated by disabling both commands (via admin.snapshot.enabled and admin.restore.enabled), disabling the whole AdminServer interface (via admin.enableServer), or ensuring that the root ACL does not provide open permissions. (Note that ZooKeeper ACLs are not recursive, so this does not impact operations on child nodes besides notifications from recursive watches.)

References

Affected packages

Debian:13 / zookeeper

Package

Name
zookeeper
Purl
pkg:deb/debian/zookeeper?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.9.3-1
3.9.3-2
3.9.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / zookeeper

Package

Name
zookeeper
Purl
pkg:deb/debian/zookeeper?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.9.4-1

Affected versions

3.*

3.9.3-1
3.9.3-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}