First published: Fri Feb 21 2025(Updated: )
There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
<5a0e2cb5e3958dd90bb8569a2766622cb74d90c1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0838 is classified as a high severity vulnerability due to the potential for exploitation via heap buffer overflow.
To fix CVE-2025-0838, update to a patched version of Abseil-cpp that addresses the heap buffer overflow vulnerability.
CVE-2025-0838 affects Abseil-cpp versions prior to commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1.
The methods reserve() and rehash() in absl::{flat,node}hash{set,map} are vulnerable in CVE-2025-0838.
CVE-2025-0838 is classified as a heap buffer overflow vulnerability allowing attackers to introduce denial of service risks or remote code execution.