UbuntuUpdates.org

Package "libabsl-dev"

Name: libabsl-dev

Description:

extensions to the C++ standard library (development files)

Latest version: 0~20210324.2-2ubuntu0.3
Release: jammy (22.04)
Level: updates
Repository: main
Head package: abseil
Homepage: https://abseil.io/

Links


Download "libabsl-dev"


Other versions of "libabsl-dev" in Jammy

Repository Area Version
base main 0~20210324.2-2
security main 0~20210324.2-2ubuntu0.2
proposed main 0~20210324.2-2ubuntu0.3

Changelog

Version: 0~20210324.2-2ubuntu0.3 2026-02-17 18:07:52 UTC

  abseil (0~20210324.2-2ubuntu0.3) jammy; urgency=medium

  * Cherry-pick change from abseil_0~20210324.2-4
    - Fix "spurious -Wl flag in some pkg-config entries" by backporting a
      patch from upstream that corrects CMake pkg-config generation.
      (Closes: #1011294 LP: #2004577)

 -- Gianfranco Costamagna <email address hidden> Wed, 21 Jan 2026 15:55:22 +0100

Source diff to previous version
2004577 [SRU] Issue with libabsl-dev
1011294 libabsl-dev: spurious -Wl flag in some pkg-config entries

Version: 0~20210324.2-2ubuntu0.2 2025-05-13 15:07:39 UTC

  abseil (0~20210324.2-2ubuntu0.2) jammy-security; urgency=medium

  * SECURITY UPDATE: Heap buffer overflow.
    - debian/patches/CVE-2025-0838.patch: Add MaxValidCapacity and use
      MaxValidCapacity for checks in ./absl/container/internal/raw_hash_set.h.
    - CVE-2025-0838
  * debian/patches/0001-skip-test-ppc64el-ftbfs.patch: Skip tests causing build
    failures on ppc64el architecture in
    ./absl/debugging/failure_signal_handler_test.cc.

 -- Hlib Korzhynskyy <email address hidden> Wed, 07 May 2025 15:02:56 -0230

CVE-2025-0838 There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,ma



About   -   Send Feedback to @ubuntu_updates