Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2025-4802 |
CWE-ID | CWE-426 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system glibc-help Operating systems & Components / Operating system package or component nss_modules Operating systems & Components / Operating system package or component nscd Operating systems & Components / Operating system package or component libnsl Operating systems & Components / Operating system package or component glibc-nss-devel Operating systems & Components / Operating system package or component glibc-locale-source Operating systems & Components / Operating system package or component glibc-locale-archive Operating systems & Components / Operating system package or component glibc-devel Operating systems & Components / Operating system package or component glibc-debugutils Operating systems & Components / Operating system package or component glibc-debugsource Operating systems & Components / Operating system package or component glibc-debuginfo Operating systems & Components / Operating system package or component glibc-compat-2.17 Operating systems & Components / Operating system package or component glibc-common Operating systems & Components / Operating system package or component glibc-all-langpacks Operating systems & Components / Operating system package or component glibc Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU109844
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-4802
CWE-ID:
CWE-426 - Untrusted Search Path
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to usage of an untrusted LD_LIBRARY_PATH environment variable. A local user can use the LD_LIBRARY_PATH environment variable to point to a malicious binary and execute arbitrary code with escalated privileges.
The vulnerability affects statically linked setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4 - 24.03 LTS SP1
glibc-help: before 2.34-167
nss_modules: before 2.34-167
nscd: before 2.34-167
libnsl: before 2.34-167
glibc-nss-devel: before 2.34-167
glibc-locale-source: before 2.34-167
glibc-locale-archive: before 2.34-167
glibc-devel: before 2.34-167
glibc-debugutils: before 2.34-167
glibc-debugsource: before 2.34-167
glibc-debuginfo: before 2.34-167
glibc-compat-2.17: before 2.34-167
glibc-common: before 2.34-167
glibc-all-langpacks: before 2.34-167
glibc: before 2.34-167
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1581
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.