Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-0838

Опубликовано: 21 фев. 2025
Источник: ubuntu
Приоритет: medium
CVSS3: 9.8

Описание

There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1

РелизСтатусПримечание
devel

released

20240722.0-3ubuntu1
esm-infra/focal

DNE

focal

DNE

jammy

released

0~20210324.2-2ubuntu0.2
noble

released

20220623.1-3.1ubuntu3.2
oracular

released

20230802.1-4ubuntu1.2
plucky

released

20230802.1-4.2ubuntu0.2
questing

released

20240722.0-3ubuntu1
upstream

needs-triage

Показывать по

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 5.6
redhat
12 месяцев назад

There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1

CVSS3: 9.8
nvd
12 месяцев назад

There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1

CVSS3: 9.8
debian
12 месяцев назад

There exists a heap buffer overflow vulnerable in Abseil-cpp. The size ...

suse-cvrf
9 дней назад

Security update for abseil-cpp

CVSS3: 9.8
github
12 месяцев назад

There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1

9.8 Critical

CVSS3