RLSA-2025:9178

Source
https://errata.rockylinux.org/RLSA-2025:9178
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2025:9178.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2025:9178
Upstream
Published
2025-10-03T19:56:45.270310Z
Modified
2025-10-03T20:19:05.786788Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Important: kea security update
Details

DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon.

Security Fix(es):

  • kea: Loading a malicious hook library can lead to local privilege escalation (CVE-2025-32801)

  • kea: Insecure handling of file paths allows multiple local attacks (CVE-2025-32802)

  • kea: Insecure file permissions can result in confidential information leakage (CVE-2025-32803)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:10 / kea

Package

Name
kea
Purl
pkg:rpm/rocky-linux/kea?distro=rocky-linux-10-0&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:2.6.3-1.el10_0
Database specific
{
    "yum_repository": "BaseOS"
}

Database specific

source
"https://storage.googleapis.com/resf-osv-data/RLSA-2025:9178.json"