{"id":"AZL-76853","summary":"CVE-2025-0838 affecting package abseil-cpp 20240116.0-2","details":"There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1","modified":"2026-04-01T05:23:00.345120Z","published":"2025-02-21T15:15:11Z","upstream":["CVE-2025-0838"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-0838"}],"affected":[{"package":{"name":"abseil-cpp","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/abseil-cpp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"20240116.0-2"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-76853.json"}}],"schema_version":"1.7.5"}