abseil.abseil-cpp is vulnerable to Integer Overflow
59
Medium Risk
Affected versions of this package are vulnerable to integer overflow in absl::{flat,node}_hash_{set,map} during container creation or resizing via constructors, reserve(), or rehash(). These methods fail to enforce upper bounds on size arguments, potentially causing overflows when allocating the backing store and leading to out-of-bounds memory access. The fix introduces proper validation of size arguments and updates max_size() to reflect safe limits. While exploitation is considered difficult due to limited attacker control over container sizes, applications using untrusted input should upgrade to a patched version.
You are affected if you are using a version that falls within the vulnerable range.
abseil.abseil-cpp is vulnerable to Integer Overflow in versions 20240722.0 - 20240722.0, 20240116.0 - 20240116.2 and 20230802.0 - 20230802.2.
Upgrade the abseil.abseil-cpp library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant