There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1
CVSS
No CVSS.
References
Configurations
No configuration.
History
05 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
21 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-21 15:15
Updated : 2025-04-05 16:15
NVD link : CVE-2025-0838
Mitre link : CVE-2025-0838
CVE.ORG link : CVE-2025-0838
JSON object : View
Products Affected
No product.
CWE
CWE-190
Integer Overflow or Wraparound