Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
Metrics
Affected Vendors & Products
References
History
Sat, 17 May 2025 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Sat, 17 May 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 16 May 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo). | |
Weaknesses | CWE-426 | |
References |
|

Status: PUBLISHED
Assigner: glibc
Published: 2025-05-16T19:32:50.586Z
Updated: 2025-05-17T02:32:42.800Z
Reserved: 2025-05-15T21:32:45.284Z
Link: CVE-2025-4802

Updated: 2025-05-17T00:11:36.562Z

Status : Received
Published: 2025-05-16T20:15:22.280
Modified: 2025-05-17T03:16:56.270
Link: CVE-2025-4802

No data.