There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1
References
Link | Resource |
---|---|
https://github.com/abseil/abseil-cpp/commit/5a0e2cb5e3958dd90bb8569a2766622cb74d90c1 | Patch |
https://lists.debian.org/debian-lts-announce/2025/04/msg00012.html | Mailing List Third Party Advisory |
Configurations
History
30 Jul 2025, 18:10
Type | Values Removed | Values Added |
---|---|---|
First Time |
Abseil common Libraries
Debian debian Linux Abseil Debian |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:abseil:common_libraries:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
References | () https://github.com/abseil/abseil-cpp/commit/5a0e2cb5e3958dd90bb8569a2766622cb74d90c1 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2025/04/msg00012.html - Mailing List, Third Party Advisory |
05 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
21 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-21 15:15
Updated : 2025-07-30 18:10
NVD link : CVE-2025-0838
Mitre link : CVE-2025-0838
CVE.ORG link : CVE-2025-0838
JSON object : View
Products Affected
debian
- debian_linux
abseil
- common_libraries
CWE
CWE-190
Integer Overflow or Wraparound