CVE-2025-4802

Source
https://cve.org/CVERecord?id=CVE-2025-4802
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-4802.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-4802
Downstream
Related
Published
2025-05-16T20:15:22.280Z
Modified
2026-04-16T04:39:05.930660695Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Untrusted LDLIBRARYPATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).

References

Affected packages

Git / github.com/bminor/glibc

Affected ranges

Type
GIT
Repo
https://github.com/bminor/glibc
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.27"
        },
        {
            "last_affected": "2.38"
        }
    ]
}

Affected versions

Other
changelog-ends-here
glibc-2.*
glibc-2.27
glibc-2.27.9000
glibc-2.28
glibc-2.28.9000
glibc-2.29
glibc-2.29.9000
glibc-2.30
glibc-2.30.9000
glibc-2.31
glibc-2.31.9000
glibc-2.32
glibc-2.32.9000
glibc-2.33
glibc-2.33.9000
glibc-2.34
glibc-2.34.9000
glibc-2.35
glibc-2.35.9000
glibc-2.36
glibc-2.36.9000
glibc-2.37
glibc-2.37.9000
glibc-2.38

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-4802.json"