Metrics
Affected Vendors & Products
Wed, 09 Jul 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.17::el9 |
Thu, 03 Jul 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel Aus
Redhat rhel Els |
|
| CPEs | cpe:/o:redhat:rhel_aus:7.7 cpe:/o:redhat:rhel_els:7 |
|
| Vendors & Products |
Redhat rhel Aus
Redhat rhel Els |
Wed, 02 Jul 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.16::el9 cpe:/a:redhat:openshift:4.18::el9 |
Tue, 01 Jul 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat openshift
|
|
| CPEs | cpe:/a:redhat:openshift:4.19::el9 | |
| Vendors & Products |
Redhat openshift
|
Mon, 23 Jun 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel Eus
|
|
| CPEs | cpe:/a:redhat:rhel_eus:9.4 | |
| Vendors & Products |
Redhat rhel Eus
|
Tue, 17 Jun 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnu
Gnu glibc |
|
| CPEs | cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gnu
Gnu glibc |
Fri, 13 Jun 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat discovery
|
|
| CPEs | cpe:/a:redhat:discovery:1.14::el9 | |
| Vendors & Products |
Redhat discovery
|
Tue, 10 Jun 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Fri, 23 May 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
threat_severity
|
threat_severity
|
Wed, 21 May 2025 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 20 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Sat, 17 May 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 17 May 2025 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Sat, 17 May 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 16 May 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo). | |
| Weaknesses | CWE-426 | |
| References |
|
Status: PUBLISHED
Assigner: glibc
Published: 2025-05-16T19:32:50.586Z
Updated: 2025-07-26T03:55:53.798Z
Reserved: 2025-05-15T21:32:45.284Z
Link: CVE-2025-4802
Updated: 2025-05-17T08:03:25.762Z
Status : Analyzed
Published: 2025-05-16T20:15:22.280
Modified: 2025-06-17T14:09:23.137
Link: CVE-2025-4802