CVE-2025-0838
Publication date 21 February 2025
Last updated 31 March 2025
Ubuntu priority
There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container’s backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1
Status
Package | Ubuntu Release | Status |
---|---|---|
abseil | 24.10 oracular |
Vulnerable, fix deferred
|
24.04 LTS noble |
Vulnerable, fix deferred
|
|
22.04 LTS jammy |
Vulnerable, fix deferred
|
|
20.04 LTS focal | Not in release |
Notes
mdeslaur
as of 2025-03-31, there appears to be an additional commit to improve the fix for this issue: https://github.com/abseil/abseil-cpp/commit/fbc0df206fbb5512d0e85b995e1f652d5c905640 but then the fix was reverted: https://github.com/abseil/abseil-cpp/commit/b22423ecb64105ef72797f2fbb251993312ad7bf we should defer fixing this until a complete fix is available