Bug 2367468 (CVE-2025-4802)
Summary: | CVE-2025-4802 glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | ashankar, cchiang, codonell, dj, fweimer, it.vidhyadharan, pfrankli |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | --- | |
Doc Text: |
A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2367471, 2367472, 2367473, 2367474 | ||
Bug Blocks: |
Description
OSIDB Bzimport
2025-05-20 13:02:40 UTC
Vulnerable-Commit: 10e93d968716ab82931d593bada121c17c0a4b93 (2.27) Fix-Commit: 5451fa962cd0a90a0e2ec1d8910a559ace02bba0 (2.39) The issue found on registry.access.redhat.com/ubi9/openjdk-21-runtime:1.22-1.1747241886 very latest images. and which uses - > registry.redhat.io/rhel9-osbs/osbs-ubi9-minimal:latest { "text": "", "id": 46, "severity": "high", "cvss": 8.4, "status": "affected", "cve": "CVE-2025-4802", "cause": "", "description": "Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).", "title": "", "vecStr": "", "exploit": "", "riskFactors": { "Attack complexity: low": true, "DoS - High": true, "High severity": true, "Recent vulnerability": true }, "link": "https://access.redhat.com/security/cve/CVE-2025-4802", "type": "image", "packageType": "os", "layerTime": 1747241654, "templates": null, "twistlock": false, "cri": false, "published": 1747426522, "fixDate": 0, "applicableRules": [ "*" ], "discovered": "2025-05-21T12:35:36Z", "functionLayer": "", "wildfireMalware": {}, "secret": {}, "severityCHML": "H", "packageName": "glibc", "packageVersion": "2.34-168.el9_6.14", "packageBinaryPkgs": [ "glibc-common", "glibc-minimal-langpack", "glibc" ], "packagePath": "", "packageLicense": "LGPLv2+ and LGPLv2+ with exceptions and GPLv2+ and GPLv2+ with exceptions and BSD and Inner-Net and ISC and Public Domain and GFDL" } This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:8655 https://access.redhat.com/errata/RHSA-2025:8655 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:8686 https://access.redhat.com/errata/RHSA-2025:8686 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:9336 https://access.redhat.com/errata/RHSA-2025:9336 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.19 Via RHSA-2025:9750 https://access.redhat.com/errata/RHSA-2025:9750 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.16 Via RHSA-2025:9765 https://access.redhat.com/errata/RHSA-2025:9765 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.18 Via RHSA-2025:9725 https://access.redhat.com/errata/RHSA-2025:9725 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Advanced Update Support Via RHSA-2025:10220 https://access.redhat.com/errata/RHSA-2025:10220 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2025:10219 https://access.redhat.com/errata/RHSA-2025:10219 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.17 Via RHSA-2025:10294 https://access.redhat.com/errata/RHSA-2025:10294 |