Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-0838

Опубликовано: 21 фев. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 9.8

Описание

There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1

РелизСтатусПримечание
devel

released

20240722.0-3ubuntu1
esm-infra/focal

DNE

focal

DNE

jammy

released

0~20210324.2-2ubuntu0.2
noble

released

20220623.1-3.1ubuntu3.2
oracular

released

20230802.1-4ubuntu1.2
plucky

released

20230802.1-4.2ubuntu0.2
questing

released

20240722.0-3ubuntu1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 50%
0.00269
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 5.6
redhat
10 месяцев назад

There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1

CVSS3: 9.8
nvd
10 месяцев назад

There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1

CVSS3: 9.8
debian
10 месяцев назад

There exists a heap buffer overflow vulnerable in Abseil-cpp. The size ...

CVSS3: 9.8
github
10 месяцев назад

There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1

CVSS3: 9.8
fstec
10 месяцев назад

Уязвимость открытой библиотеки для расширения стандартной библиотеки C++ Abseil-cpp, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальной информации

EPSS

Процентиль: 50%
0.00269
Низкий

9.8 Critical

CVSS3