PT-2025-21753 · Unknown+10 · Gnu C Library+10
Carlos Odonell
·
Published
2025-05-15
·
Updated
2026-04-13
·
CVE-2025-4802
CVSS v3.1
7.8
High
| AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
GNU C Library versions 2.27 through 2.38
Description
The issue is related to the untrusted LD LIBRARY PATH environment variable vulnerability in the GNU C Library. This vulnerability allows an attacker to control the loading of a dynamically shared library in statically compiled setuid binaries that call dlopen, including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo. The vulnerability can be exploited by an attacker to execute arbitrary code with elevated privileges. It is estimated that millions of Linux systems are potentially affected by this issue.
Recommendations
To resolve the issue, update the GNU C Library to version 2.39 or later.
As a temporary workaround, consider restricting access to the LD LIBRARY PATH environment variable to minimize the risk of exploitation.
Additionally, audit setuid binaries and remove any unnecessary ones to reduce the attack surface.
Implement access control mechanisms, such as SELinux or AppArmor, to limit the ability to manipulate environment variables.
Exploit
Fix
Untrusted Search Path
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Almalinux
Astra Linux
Centos
Debian
Gnu C Library
Linuxmint
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu