There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1
References
| Link | Resource |
|---|---|
| https://github.com/abseil/abseil-cpp/commit/5a0e2cb5e3958dd90bb8569a2766622cb74d90c1 | Patch |
| https://lists.debian.org/debian-lts-announce/2025/04/msg00012.html | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-02-21 15:15
Updated : 2025-07-30 18:10
NVD link : CVE-2025-0838
Mitre link : CVE-2025-0838
CVE.ORG link : CVE-2025-0838
JSON object : View
Products Affected
debian
- debian_linux
abseil
- common_libraries
CWE
CWE-190
Integer Overflow or Wraparound
