CARVIEW |
Select Language
HTTP/2 200
date: Fri, 18 Jul 2025 04:45:27 GMT
content-type: text/html; charset=utf-8
vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, X-Requested-With,Accept-Encoding, Accept, X-Requested-With
etag: W/"ff18ab55126f435f515987167c6b3b10"
cache-control: max-age=0, private, must-revalidate
strict-transport-security: max-age=31536000; includeSubdomains; preload
x-frame-options: deny
x-content-type-options: nosniff
x-xss-protection: 0
referrer-policy: no-referrer-when-downgrade
content-security-policy: default-src 'none'; base-uri 'self'; child-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com *.rel.tunnels.api.visualstudio.com wss://*.rel.tunnels.api.visualstudio.com objects-origin.githubusercontent.com copilot-proxy.githubusercontent.com proxy.individual.githubcopilot.com proxy.business.githubcopilot.com proxy.enterprise.githubcopilot.com *.actions.githubusercontent.com wss://*.actions.githubusercontent.com productionresultssa0.blob.core.windows.net/ productionresultssa1.blob.core.windows.net/ productionresultssa2.blob.core.windows.net/ productionresultssa3.blob.core.windows.net/ productionresultssa4.blob.core.windows.net/ productionresultssa5.blob.core.windows.net/ productionresultssa6.blob.core.windows.net/ productionresultssa7.blob.core.windows.net/ productionresultssa8.blob.core.windows.net/ productionresultssa9.blob.core.windows.net/ productionresultssa10.blob.core.windows.net/ productionresultssa11.blob.core.windows.net/ productionresultssa12.blob.core.windows.net/ productionresultssa13.blob.core.windows.net/ productionresultssa14.blob.core.windows.net/ productionresultssa15.blob.core.windows.net/ productionresultssa16.blob.core.windows.net/ productionresultssa17.blob.core.windows.net/ productionresultssa18.blob.core.windows.net/ productionresultssa19.blob.core.windows.net/ github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com api.githubcopilot.com api.individual.githubcopilot.com api.business.githubcopilot.com api.enterprise.githubcopilot.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com copilot-workspace.githubnext.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: blob: github.githubassets.com media.githubusercontent.com camo.githubusercontent.com identicons.github.com avatars.githubusercontent.com private-avatars.githubusercontent.com github-cloud.s3.amazonaws.com objects.githubusercontent.com release-assets.githubusercontent.com secured-user-images.githubusercontent.com/ user-images.githubusercontent.com/ private-user-images.githubusercontent.com opengraph.githubassets.com copilotprodattachments.blob.core.windows.net/github-production-copilot-attachments/ github-production-user-asset-6210df.s3.amazonaws.com customer-stories-feed.github.com spotlights-feed.github.com objects-origin.githubusercontent.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/ secured-user-images.githubusercontent.com/ private-user-images.githubusercontent.com github-production-user-asset-6210df.s3.amazonaws.com gist.github.com; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; upgrade-insecure-requests; worker-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/
server: github.com
content-encoding: gzip
accept-ranges: bytes
set-cookie: _gh_sess=ovsEv9bou%2F30H1ynDwmMKxDAmFOg6umepO%2F%2FnmK8BnNuPyKOU1ByPcE2tp2la8ETRCInrafNhsNCcTweLraKbcp%2FG7kj5knk7k1wJfukuF7Sq0pnwcf4o8x5xaCMktU%2FKlxtkSS1kNXFlQJg%2FFy%2FF%2B0gTaenSqKlPZmMemRDu8g2r3pA1C9vCkGHq9sQuqQVDagyvjsPMd6vba23sm6kQoBUnf9EBwd2Z644BxOjqyCkAZAy1NjjzR5JnQIqVZepeKEcgjuYcHbUjs4T5KmNyg%3D%3D--aaLQiQdVJgIPush5--BSEv1zph4MNht8QsL4VH9w%3D%3D; Path=/; HttpOnly; Secure; SameSite=Lax
set-cookie: _octo=GH1.1.1539317525.1752813927; Path=/; Domain=github.com; Expires=Sat, 18 Jul 2026 04:45:27 GMT; Secure; SameSite=Lax
set-cookie: logged_in=no; Path=/; Domain=github.com; Expires=Sat, 18 Jul 2026 04:45:27 GMT; HttpOnly; Secure; SameSite=Lax
x-github-request-id: B576:1EEA87:76B84A:95C003:6879D167
Tags · abseil/abseil-cpp · GitHub
Toggle 20250512.0's commit message
Toggle 20250512.rc1's commit message
Toggle 20250127.1's commit message
Toggle 20250127.0's commit message
Toggle 20250127.rc2's commit message
Toggle 20240722.1's commit message
Toggle 20240116.3's commit message
Toggle 20230802.3's commit message
Skip to content
Navigation Menu
{{ message }}
-
Notifications
You must be signed in to change notification settings - Fork 2.8k
Tags: abseil/abseil-cpp
Tags
20250512.0
Apply LTS transformations for 20250512 LTS branch (#1886) * Apply LTS transformations for 20250512 LTS branch * Cherry-pick google/cctz@306fd9b
20250512.rc1
Apply LTS transformations for 20250512 LTS branch (#1886) * Apply LTS transformations for 20250512 LTS branch * Cherry-pick google/cctz@306fd9b
20250127.1
Abseil LTS Branch, Jan 2025, Patch 1 (#1857) -- Fix buffer overflow the internal demangling function The overflow can happen during rollback after a parsing failure, where the null terminator is written without verifying the buffer bounds. Credit to www.code-intelligence.com for reporting this issue PiperOrigin-RevId: 732995553 Change-Id: Ic5075f53e510d270e1784d593defcd53f9121d02 -- Actually use the hint space instruction to strip PAC bits for return addresses in stack traces as the comment says https://android.googlesource.com/platform/libcore/+/71f2c75111e87091616f0f3b86bea6c4d345dad1/src/hotspot/os_cpu/linux_aarch64/pauth_linux_aarch64.inline.hpp PiperOrigin-RevId: 724360415 Change-Id: I691160e43354131a04919765ce283e07c3c933a9
20250127.0
PR #1819: fix compilation with AppleClang (#1820) Imported from GitHub PR #1819 Fix the following error: absl/random/internal/randen_detect.cc:123:12: error: no member named 'nullopt' in namespace 'std'; did you mean 'absl::nullopt'? 123 | return std::nullopt; | ^~~~~~~~~~~~ | absl::nullopt absl/types/optional.h:86:43: note: 'absl::nullopt' declared here 86 | ABSL_INTERNAL_INLINE_CONSTEXPR(nullopt_t, nullopt, | ^ Merge b9a2d39 into 7253ff8 Merging this change closes #1819 COPYBARA_INTEGRATE_REVIEW=#1819 from clementperon:master b9a2d39 PiperOrigin-RevId: 722599523 Change-Id: Ie66cbf9daf3b115668194da8b74acd6a43e12a03 Co-authored-by: Clément Péron <peron.clem@gmail.com>
20250127.rc2
PR #1819: fix compilation with AppleClang (#1820) Imported from GitHub PR #1819 Fix the following error: absl/random/internal/randen_detect.cc:123:12: error: no member named 'nullopt' in namespace 'std'; did you mean 'absl::nullopt'? 123 | return std::nullopt; | ^~~~~~~~~~~~ | absl::nullopt absl/types/optional.h:86:43: note: 'absl::nullopt' declared here 86 | ABSL_INTERNAL_INLINE_CONSTEXPR(nullopt_t, nullopt, | ^ Merge b9a2d39 into 7253ff8 Merging this change closes #1819 COPYBARA_INTEGRATE_REVIEW=#1819 from clementperon:master b9a2d39 PiperOrigin-RevId: 722599523 Change-Id: Ie66cbf9daf3b115668194da8b74acd6a43e12a03 Co-authored-by: Clément Péron <peron.clem@gmail.com>
20240722.1
Fix potential integer overflow in hash container create/resize (#1811) The sized constructors, reserve(), and rehash() methods of absl::{flat,node}_hash_{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store. Subsequent accesses to the container might then access out-of-bounds memory. The fix is in two parts: 1) Update max_size() to return the maximum number of items that can be stored in the container 2) Validate the size arguments to the constructors, reserve(), and rehash() methods, and abort the program when the argument is invalid We've looked at uses of these containers in Google codebases like Chrome, and determined this vulnerability is likely to be difficult to exploit. This is primarily because container sizes are rarely attacker-controlled. The bug was discovered by Dmitry Vyukov <dvyukov@google.com>.
20240116.3
Fix potential integer overflow in hash container create/resize (#1812) The sized constructors, reserve(), and rehash() methods of absl::{flat,node}_hash_{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store. Subsequent accesses to the container might then access out-of-bounds memory. The fix is in two parts: 1) Update max_size() to return the maximum number of items that can be stored in the container 2) Validate the size arguments to the constructors, reserve(), and rehash() methods, and abort the program when the argument is invalid We've looked at uses of these containers in Google codebases like Chrome, and determined this vulnerability is likely to be difficult to exploit. This is primarily because container sizes are rarely attacker-controlled. The bug was discovered by Dmitry Vyukov <dvyukov@google.com>.
20230802.3
Fix potential integer overflow in hash container create/resize (#1813) The sized constructors, reserve(), and rehash() methods of absl::{flat,node}_hash_{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store. Subsequent accesses to the container might then access out-of-bounds memory. The fix is in two parts: 1) Update max_size() to return the maximum number of items that can be stored in the container 2) Validate the size arguments to the constructors, reserve(), and rehash() methods, and abort the program when the argument is invalid We've looked at uses of these containers in Google codebases like Chrome, and determined this vulnerability is likely to be difficult to exploit. This is primarily because container sizes are rarely attacker-controlled. The bug was discovered by Dmitry Vyukov <dvyukov@google.com>.
PreviousNext
You can’t perform that action at this time.