[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 4116-1] abseil security update



-------------------------------------------------------------------------
Debian LTS Advisory DLA-4116-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                         Tobias Frost
April 05, 2025                                https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package        : abseil
Version        : 0~20200923.3-2+deb11u1
CVE ID         : CVE-2025-0838
Debian Bug     : 1098903

A vulnerability has been found in abseil, a collection of open-source C++
libraries that extend the C++ standard library, which might cause an heap
buffer overflow. 

CVE-2025-0838

    There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized
    constructors, reserve(), and rehash() methods of
    absl::{flat,node}hash{set,map} did not impose an upper bound on their
    size argument. As a result, it was possible for a caller to pass a very
    large size that would cause an integer overflow when computing the size
    of the container's backing store, and a subsequent out-of-bounds memory
    write. Subsequent accesses to the container might also access
    out-of-bounds memory.
    
For Debian 11 bullseye, this problem has been fixed in version
0~20200923.3-2+deb11u1.

We recommend that you upgrade your abseil packages.

For the detailed security status of abseil please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/abseil

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: PGP signature


Reply to: