Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
History

Sat, 17 May 2025 03:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 17 May 2025 01:45:00 +0000

Type Values Removed Values Added
References

Fri, 16 May 2025 19:45:00 +0000

Type Values Removed Values Added
Description Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
Weaknesses CWE-426
References

cve-icon MITRE

Status: PUBLISHED

Assigner: glibc

Published: 2025-05-16T19:32:50.586Z

Updated: 2025-05-17T02:32:42.800Z

Reserved: 2025-05-15T21:32:45.284Z

Link: CVE-2025-4802

cve-icon Vulnrichment

Updated: 2025-05-17T00:11:36.562Z

cve-icon NVD

Status : Received

Published: 2025-05-16T20:15:22.280

Modified: 2025-05-17T03:16:56.270

Link: CVE-2025-4802

cve-icon Redhat

No data.