Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4116-1 | abseil security update |
EUVD |
EUVD-2025-4520 | There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1 |
Ubuntu USN |
USN-7505-1 | Abseil vulnerability |
Wed, 30 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Abseil
Abseil common Libraries Debian Debian debian Linux |
|
| CPEs | cpe:2.3:a:abseil:common_libraries:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Abseil
Abseil common Libraries Debian Debian debian Linux |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Sat, 05 Apr 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 25 Feb 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 21 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 21 Feb 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1 | |
| Title | Heap Buffer overflow in Abseil | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-04-05T16:02:54.716Z
Reserved: 2025-01-29T14:25:32.549Z
Link: CVE-2025-0838
Updated: 2025-04-05T16:02:54.716Z
Status : Analyzed
Published: 2025-02-21T15:15:11.890
Modified: 2025-07-30T18:10:35.687
Link: CVE-2025-0838
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN