CVE-2025-0838
Publication date 21 February 2025
Last updated 14 May 2025
Ubuntu priority
There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1
Status
Package | Ubuntu Release | Status |
---|---|---|
abseil | 25.04 plucky |
Fixed 20230802.1-4.2ubuntu0.2
|
24.10 oracular |
Fixed 20230802.1-4ubuntu1.2
|
|
24.04 LTS noble |
Fixed 20220623.1-3.1ubuntu3.2
|
|
22.04 LTS jammy |
Fixed 0~20210324.2-2ubuntu0.2
|
|
20.04 LTS focal | Not in release |
Notes
mdeslaur
There was an additional commit to improve the fix for this issue: https://github.com/abseil/abseil-cpp/commit/fbc0df206fbb5512d0e85b995e1f652d5c905640 but then the fix was reverted: https://github.com/abseil/abseil-cpp/commit/b22423ecb64105ef72797f2fbb251993312ad7bf
References
Related Ubuntu Security Notices (USN)
- USN-7505-1
- Abseil vulnerability
- 12 May 2025