There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1

Subscriptions

Vendors Products
Common Libraries Subscribe
Debian Linux Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4116-1 abseil security update
EUVD EUVD EUVD-2025-4520 There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1
Ubuntu USN Ubuntu USN USN-7505-1 Abseil vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 30 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Abseil
Abseil common Libraries
Debian
Debian debian Linux
CPEs cpe:2.3:a:abseil:common_libraries:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Vendors & Products Abseil
Abseil common Libraries
Debian
Debian debian Linux
Metrics cvssV3_1

{'score': 5.6, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Sat, 05 Apr 2025 16:45:00 +0000

Type Values Removed Values Added
References

Tue, 25 Feb 2025 01:45:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.6, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L'}

threat_severity

Moderate


Fri, 21 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 21 Feb 2025 14:30:00 +0000

Type Values Removed Values Added
Description There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1
Title Heap Buffer overflow in Abseil
Weaknesses CWE-190
References
Metrics cvssV4_0

{'score': 5.9, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:A/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2025-04-05T16:02:54.716Z

Reserved: 2025-01-29T14:25:32.549Z

Link: CVE-2025-0838

cve-icon Vulnrichment

Updated: 2025-04-05T16:02:54.716Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-21T15:15:11.890

Modified: 2025-07-30T18:10:35.687

Link: CVE-2025-0838

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-02-21T14:20:52Z

Links: CVE-2025-0838 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses