CVE-2025-8058 Affecting glibc-profile package, versions <2.31-150300.98.1


Severity

Recommended
0.0
medium
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES155-GLIBCPROFILE-15662312
  • published16 Mar 2026
  • disclosed13 Mar 2026

Introduced: 13 Mar 2026

NewCVE-2025-8058  (opens in a new tab)

How to fix?

Upgrade SLES:15.5 glibc-profile to version 2.31-150300.98.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc-profile package and not the glibc-profile package as distributed by SLES. See How to fix? for SLES:15.5 relevant fixed versions and status.

The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accomplished either by a malloc failure or by using an interposed malloc that injects random malloc failures. The double free can allow buffer manipulation depending of how the regex is constructed. This issue affects all architectures and ABIs supported by the GNU C library.

CVSS Base Scores

version 3.1