vulnerability
Debian: CVE-2025-8058: glibc -- security update
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:H/Au:S/C:P/I:P/A:P) | Jul 23, 2025 | Jul 25, 2025 | Oct 8, 2025 |
Severity
4
CVSS
(AV:L/AC:H/Au:S/C:P/I:P/A:P)
Published
Jul 23, 2025
Added
Jul 25, 2025
Modified
Oct 8, 2025
Description
The regcomp function in the GNU C library version from 2.4 to 2.41 is
subject to a double free if some previous allocation fails. It can be
accomplished either by a malloc failure or by using an interposed malloc
that injects random malloc failures. The double free can allow buffer
manipulation depending of how the regex is constructed. This issue
affects all architectures and ABIs supported by the GNU C library.
Solutions
debian-upgrade-glibcno-fix-debian-deb-package
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.