The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accomplished either by a malloc failure or by using an interposed malloc that injects random malloc failures. The double free can allow buffer manipulation depending of how the regex is constructed. This issue affects all architectures and ABIs supported by the GNU C library.
History

Tue, 29 Jul 2025 12:30:00 +0000

Type Values Removed Values Added
Title glibc: Double free in glibc
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.2, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L'}

threat_severity

Moderate


Thu, 24 Jul 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Gnu
Gnu glibc
Vendors & Products Gnu
Gnu glibc

Wed, 23 Jul 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 23 Jul 2025 20:00:00 +0000

Type Values Removed Values Added
Description The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accomplished either by a malloc failure or by using an interposed malloc that injects random malloc failures. The double free can allow buffer manipulation depending of how the regex is constructed. This issue affects all architectures and ABIs supported by the GNU C library.
Weaknesses CWE-415
References
Metrics cvssV4_0

{'score': 5.9, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: glibc

Published: 2025-07-23T19:57:17.138Z

Updated: 2025-07-23T20:08:01.326Z

Reserved: 2025-07-22T18:33:43.424Z

Link: CVE-2025-8058

cve-icon Vulnrichment

Updated: 2025-07-23T20:07:52.660Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-23T20:15:27.747

Modified: 2025-07-25T15:29:44.523

Link: CVE-2025-8058

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-07-23T19:57:17Z

Links: CVE-2025-8058 - Bugzilla