Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:9178

Опубликовано: 03 окт. 2025
Источник: rocky
Оценка: Important

Описание

Important: kea security update

DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon.

Security Fix(es):

  • kea: Loading a malicious hook library can lead to local privilege escalation (CVE-2025-32801)

  • kea: Insecure handling of file paths allows multiple local attacks (CVE-2025-32802)

  • kea: Insecure file permissions can result in confidential information leakage (CVE-2025-32803)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 10

НаименованиеАрхитектураРелизRPM
keax86_641.el10_0kea-2.6.3-1.el10_0.x86_64.rpm
kea-libsx86_641.el10_0kea-libs-2.6.3-1.el10_0.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
4 месяца назад

ELSA-2025-9178: kea security update (IMPORTANT)

CVSS3: 6.1
redos
около 1 месяца назад

Множественные уязвимости kea

CVSS3: 7.8
ubuntu
5 месяцев назад

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 7.8
redhat
5 месяцев назад

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 7.8
nvd
5 месяцев назад

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.