We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-8058



Description

The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accomplished either by a malloc failure or by using an interposed malloc that injects random malloc failures. The double free can allow buffer manipulation depending of how the regex is constructed. This issue affects all architectures and ABIs supported by the GNU C library.

Reserved 2025-07-22 | Published 2025-07-23 | Updated 2025-07-23 | Assigner glibc


MEDIUM: 5.9CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H

Problem types

CWE-415 Double Free

Product status

Default status
unaffected

2.9 before 2.43
unaffected

References

sourceware.org/bugzilla/show_bug.cgi?id=33185

sourceware.org/...h=3ff17af18c38727b88d9115e536c069e6b5d601f

cve.org (CVE-2025-8058)

nvd.nist.gov (CVE-2025-8058)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-8058

Support options

Helpdesk Chat, Email, Knowledgebase