CVE Vulnerabilities

CVE-2025-8058

Double Free

Published: Jul 23, 2025 | Modified: Nov 04, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
4.2 MODERATE
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accomplished either by a malloc failure or by using an interposed malloc that injects random malloc failures. The double free can allow buffer manipulation depending of how the regex is constructed. This issue affects all architectures and ABIs supported by the GNU C library.

Weakness

The product calls free() twice on the same memory address.

Affected Software

NameVendorStart VersionEnd Version
Red Hat Enterprise Linux 10RedHatglibc-0:2.39-46.el10_0*
Red Hat Enterprise Linux 8RedHatglibc-0:2.28-251.el8_10.25*
Red Hat Enterprise Linux 8RedHatglibc-0:2.28-251.el8_10.25*
Red Hat Enterprise Linux 9RedHatglibc-0:2.34-168.el9_6.23*
Red Hat Enterprise Linux 9RedHatglibc-0:2.34-168.el9_6.23*
Red Hat Ceph Storage 7RedHatrhceph/rhceph-7-rhel9:sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe*
Red Hat Discovery 2RedHatdiscovery/discovery-server-rhel9:sha256:6464f1f591001fd514a87e3c7347d2ce709b9c97edaad2d0d649ae69499049e9*
Red Hat Insights proxy 1.5RedHatinsights-proxy/insights-proxy-container-rhel9:sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d*
Red Hat OpenShift distributed tracing 3.5.1RedHatrhosdt/jaeger-agent-rhel8:sha256:6f387ea61bf4d0c11c8fadd8225d2eca24d19e28d596afa800149925154a345a*
Red Hat OpenShift distributed tracing 3.5.1RedHatrhosdt/jaeger-all-in-one-rhel8:sha256:b45f86232d16959194bad4cc59debfc5253c3c07b81f2a2c66e15d7898d0f114*
Red Hat OpenShift distributed tracing 3.5.1RedHatrhosdt/jaeger-collector-rhel8:sha256:260572b783d27d50a2dcdcac09a1fe15358c0fa5f85de93ce5fd8321cd81a0fa*
Red Hat OpenShift distributed tracing 3.5.1RedHatrhosdt/jaeger-es-index-cleaner-rhel8:sha256:783a10c95edcb5c5cb8394b796f27dbfbb5ac6e1ee3baaa27d6c43f411ad6045*
Red Hat OpenShift distributed tracing 3.5.1RedHatrhosdt/jaeger-es-rollover-rhel8:sha256:39b2d56b8f0eb3b539697fc387ae84230182c7e8cf5c184b8ee6c02e29386120*
Red Hat OpenShift distributed tracing 3.5.1RedHatrhosdt/jaeger-ingester-rhel8:sha256:0932824cfd76c0e3d80f6e5b81312405b4a6a670d715144fc4d08bdb3a3cf962*
Red Hat OpenShift distributed tracing 3.5.1RedHatrhosdt/jaeger-operator-bundle:sha256:264613b2add0f32e5f537ee7cf9ba8019e5e9a347fdf20bc3de8d1678157ba66*
Red Hat OpenShift distributed tracing 3.5.1RedHatrhosdt/jaeger-query-rhel8:sha256:86d7a8aed1a64c10b5a52f56966645ed62ee40cd38c034bfe00b87ee4e3558a4*
Red Hat OpenShift distributed tracing 3.5.1RedHatrhosdt/jaeger-rhel8-operator:sha256:f61bf9363bf43e6e6f0156d1c2eeeecef927a46e0940062429a47a058da057ab*
GlibcUbuntuesm-infra/bionic*
GlibcUbuntuesm-infra/focal*
GlibcUbuntuesm-infra/xenial*
GlibcUbuntujammy*
GlibcUbuntunoble*
GlibcUbuntuplucky*
GlibcUbuntuupstream*

Potential Mitigations

References