Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Link | Tags |
---|---|
https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e | patch |
https://sourceware.org/bugzilla/show_bug.cgi?id=32976 | issue tracking |
http://www.openwall.com/lists/oss-security/2025/05/16/7 | mailing list |
http://www.openwall.com/lists/oss-security/2025/05/17/2 | exploit mailing list |