[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1109803: marked as done (glibc: CVE-2025-8058)



Your message dated Sat, 26 Jul 2025 18:50:50 +0000
with message-id <E1ufjys-00BrM2-2b@fasolo.debian.org>
and subject line Bug#1109803: fixed in glibc 2.41-11
has caused the Debian Bug report #1109803,
regarding glibc: CVE-2025-8058
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1109803: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109803
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: glibc
Version: 2.41-10
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Control: found -1 2.36-9+deb12u7
Control: found -1 2.36-9+deb12u10
Control: found -1 2.36-9
Control: forwarded -1 https://sourceware.org/bugzilla/show_bug.cgi?id=33185

Hi,

The following vulnerability was published for glibc.

CVE-2025-8058[0]:
| The regcomp function in the GNU C library version from 2.4 to 2.41
| is  subject to a double free if some previous allocation fails. It
| can be  accomplished either by a malloc failure or by using an
| interposed malloc  that injects random malloc failures. The double
| free can allow buffer  manipulation depending of how the regex is
| constructed. This issue  affects all architectures and ABIs
| supported by the GNU C library.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-8058
    https://www.cve.org/CVERecord?id=CVE-2025-8058
[1] https://sourceware.org/bugzilla/show_bug.cgi?id=33185
[2] https://sourceware.org/git/?p=glibc.git;a=commit;h=7ea06e994093fa0bcca0d0ee2c1db271d8d7885d
[3] https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2025-0005

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.41-11
Done: Aurelien Jarno <aurel32@debian.org>

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1109803@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno <aurel32@debian.org> (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 26 Jul 2025 20:29:12 +0200
Source: glibc
Architecture: source
Version: 2.41-11
Distribution: unstable
Urgency: medium
Maintainer: GNU Libc Maintainers <debian-glibc@lists.debian.org>
Changed-By: Aurelien Jarno <aurel32@debian.org>
Closes: 1109803
Changes:
 glibc (2.41-11) unstable; urgency=medium
 .
   * debian/patches/git-updates.diff: update from upstream stable branch:
     - Fix iconv to not create executable files with -o.
     - Fix double-free after allocation failure in regcomp (GLIBC-SA-2025-0005
       / CVE-2025-8058).  Closes: #1109803.
Checksums-Sha1:
 2931b622d180aad0ebc32521a656aebc1406c806 7544 glibc_2.41-11.dsc
 a9aaca1300e658612a7e7d60030ee47a4fa79edf 437792 glibc_2.41-11.debian.tar.xz
 6540f115b4e71ac1d6410712284b68aa7e542df7 9356 glibc_2.41-11_source.buildinfo
Checksums-Sha256:
 07b4bbd9b93343a90e89e64ae1227286884ca6e04b8a40553edc5a1aba158ed0 7544 glibc_2.41-11.dsc
 8931fe5a287262e8d0adcbdde28d08cefbe955edf7abf4c32540a5ad7f0e470d 437792 glibc_2.41-11.debian.tar.xz
 2d31497f1e2c7ad79b7f143deb0389a4ff8a191711795481324677c670046cf5 9356 glibc_2.41-11_source.buildinfo
Files:
 abadf10b156698691b691a436d8fa044 7544 libs required glibc_2.41-11.dsc
 fdb42bc1b6f7a918079d34ef4688543d 437792 libs required glibc_2.41-11.debian.tar.xz
 a9def08992760ce18ba034d936c8ec7e 9356 libs required glibc_2.41-11_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=qdj5
-----END PGP SIGNATURE-----

Attachment: pgpMSt5KBTU7G.pgp
Description: PGP signature


--- End Message ---

Reply to: