CVE-2025-0838

Publication date 21 February 2025

Last updated 31 March 2025


Ubuntu priority

There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container’s backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1

Read the notes from the security team

Status

Package Ubuntu Release Status
abseil 24.10 oracular
Vulnerable, fix deferred
24.04 LTS noble
Vulnerable, fix deferred
22.04 LTS jammy
Vulnerable, fix deferred
20.04 LTS focal Not in release

Notes


mdeslaur

as of 2025-03-31, there appears to be an additional commit to improve the fix for this issue: https://github.com/abseil/abseil-cpp/commit/fbc0df206fbb5512d0e85b995e1f652d5c905640 but then the fix was reverted: https://github.com/abseil/abseil-cpp/commit/b22423ecb64105ef72797f2fbb251993312ad7bf we should defer fixing this until a complete fix is available

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
abseil