CVE-2025-0838

NameCVE-2025-0838
DescriptionThere exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1098903

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
abseil (PTS)bullseye0~20200923.3-2vulnerable
bookworm20220623.1-1vulnerable
sid, trixie20240722.0-1.5vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
abseilsource(unstable)(unfixed)1098903

Notes

[bookworm] - abseil <no-dsa> (Minor issue)
https://github.com/abseil/abseil-cpp/commit/5a0e2cb5e3958dd90bb8569a2766622cb74d90c1 (20250127.rc1)

Search for package or bug name: Reporting problems