Kea DHCP: Local Vulnerabilities in Many Linux and BSD Distributions

22 zdw 3 5/29/2025, 5:57:46 PM security.opensuse.org ↗

Comments (3)

hulitu · 1d ago
> The Kea DHCP distribution is the next generation DHCP server suite offered by the Internet Systems Consortium (ISC). It replaces the traditional ISC DHCP software which has reached its end of life.

> ) Security Issues 3.1) Local Privilege Escalation by Injecting a Hook Library via the set-config Command (CVE-2025-32801) 3.2) Arbitrary File Overwrite via config-write Command (CVE-2025-32802) 3.3) Redirection of Log Files to Arbitrary Paths (shared CVE with 3.2) 3.4) Service Spoofing with Sockets in /tmp (shared CVE with 3.2) 3.5) Denial-of-Service issues with Sockets in /tmp (shared CVE with 3.2) 3.6) World-Readable DHCP Lease Files in /var/lib/kea/*.cvs (CVE-2025-32803) 3.7) World-Readable Kea Log Files (shared CVE with 3.6)

So CADT all over. Why fix old bugs when you can introduce new ones.

eliaspro · 21h ago
At a first glance, it looks like every single one of those vulnerabilities is mitigated by mostly standard practices for systemd service units, like not running as root in the first place, using NoNewPrivileges=, ProtectSystem=, PrivateTmp=, StateDirectory= and ConfigurationDirectory= etc
bogantech · 1d ago
Why are so many distros running Kea as root?