Metrics
Affected Vendors & Products
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Wed, 09 Jul 2025 16:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.17::el9 | 
Thu, 03 Jul 2025 02:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Redhat rhel Aus
         Redhat rhel Els  | 
|
| CPEs | cpe:/o:redhat:rhel_aus:7.7 cpe:/o:redhat:rhel_els:7  | 
|
| Vendors & Products | 
        
        Redhat rhel Aus
         Redhat rhel Els  | 
Wed, 02 Jul 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.16::el9 cpe:/a:redhat:openshift:4.18::el9  | 
Tue, 01 Jul 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Redhat openshift
         | 
|
| CPEs | cpe:/a:redhat:openshift:4.19::el9 | |
| Vendors & Products | 
        
        Redhat openshift
         | 
Mon, 23 Jun 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Redhat rhel Eus
         | 
|
| CPEs | cpe:/a:redhat:rhel_eus:9.4 | |
| Vendors & Products | 
        
        Redhat rhel Eus
         | 
Tue, 17 Jun 2025 14:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Gnu
         Gnu glibc  | 
|
| CPEs | cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Gnu
         Gnu glibc  | 
Fri, 13 Jun 2025 19:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Redhat discovery
         | 
|
| CPEs | cpe:/a:redhat:discovery:1.14::el9 | |
| Vendors & Products | 
        
        Redhat discovery
         | 
Tue, 10 Jun 2025 06:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Redhat
         Redhat enterprise Linux  | 
|
| CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9  | 
|
| Vendors & Products | 
        
        Redhat
         Redhat enterprise Linux  | 
Fri, 23 May 2025 02:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        threat_severity
         
  | 
    
        
        
        threat_severity
         
  | 
Wed, 21 May 2025 03:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Title | glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH | |
| References | 
         | |
| Metrics | 
        
        
        threat_severity
         
  | 
    
        
        
        threat_severity
         
  | 
Tue, 20 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        cvssV3_1
         
 
  | 
    
        
        
        cvssV3_1
         
 
  | 
Sat, 17 May 2025 08:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Sat, 17 May 2025 03:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        cvssV3_1
         
 
  | 
Sat, 17 May 2025 01:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Fri, 16 May 2025 19:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo). | |
| Weaknesses | CWE-426 | |
| References | 
         | 
Status: PUBLISHED
Assigner: glibc
Published:
Updated: 2025-11-03T20:04:41.052Z
Reserved: 2025-05-15T21:32:45.284Z
Link: CVE-2025-4802
Updated: 2025-11-03T20:04:41.052Z
Status : Modified
Published: 2025-05-16T20:15:22.280
Modified: 2025-11-03T20:19:11.153
Link: CVE-2025-4802