CVE-2025-8058
Published: July 24, 2025Last modified: July 26, 2025
Description
The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accomplished either by a malloc failure or by using an interposed malloc that injects random malloc failures. The double free can allow buffer manipulation depending of how the regex is constructed. This issue affects all architectures and ABIs supported by the GNU C library.
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | glibc | Fixed (2.37.0-r19) |
Stream | glibc | Fixed (2.39.0-r4) | |
Hardened Containers | 23 LTS | glibc | Fixed (2.37.0-r19) |
Stream | glibc | Fixed (2.39.0-r4) |
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=33185
- https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f