PT-2025-21753 · Unknown+10 · Gnu C Library+10

Carlos Odonell

·

Published

2025-05-15

·

Updated

2026-04-13

·

CVE-2025-4802

CVSS v3.1

7.8

High

AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions GNU C Library versions 2.27 through 2.38
Description The issue is related to the untrusted LD LIBRARY PATH environment variable vulnerability in the GNU C Library. This vulnerability allows an attacker to control the loading of a dynamically shared library in statically compiled setuid binaries that call dlopen, including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo. The vulnerability can be exploited by an attacker to execute arbitrary code with elevated privileges. It is estimated that millions of Linux systems are potentially affected by this issue.
Recommendations To resolve the issue, update the GNU C Library to version 2.39 or later. As a temporary workaround, consider restricting access to the LD LIBRARY PATH environment variable to minimize the risk of exploitation. Additionally, audit setuid binaries and remove any unnecessary ones to reduce the attack surface. Implement access control mechanisms, such as SELinux or AppArmor, to limit the ability to manipulate environment variables.

Exploit

Fix

Untrusted Search Path

Weakness Enumeration

Related Identifiers

ALSA-2025:8655
ALSA-2025:8686
BDU:2025-05682
CESA-2025_8686
CVE-2025-4802
DLA-4181-1
ECHO-9557-5D0C-3A13
INFSA-2025_8655
INFSA-2025_8686
MGASA-2025-0164
OESA-2025-1581
OPENSUSE-SU-2025:15222-1
OPENSUSE-SU-2025:15697-1
OPENSUSE-SU-2025_01702-1
OPENSUSE-SU-2025_01784-1
RHSA-2025:10219
RHSA-2025:10220
RHSA-2025:8655
RHSA-2025:8686
RHSA-2025:9336
RHSA-2025_8655
RHSA-2025_8686
SUSE-SU-2025:01702-1
SUSE-SU-2025:01702-2
SUSE-SU-2025:01784-1
SUSE-SU-2025:20332-1
SUSE-SU-2025:20361-1
SUSE-SU-2025_01702-1
SUSE-SU-2025_01702-2
SUSE-SU-2025_01784-1
USN-7541-1

Affected Products

Almalinux
Astra Linux
Centos
Debian
Gnu C Library
Linuxmint
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu