Debian Patches

Status for abseil/20220623.1-1+deb12u2

Patch Description Author Forwarded Bugs Origin Last update
configure.diff Set package configuration options
Configure Abseil for Debian.

- Set the SONAME appropriately.

- To minimize the possibility of future ABI breakage, treat absl::any,
absl::optional, absl::string_view, and absl::variant as their own types
(rather than aliases for the std:: versions), and compile everything in an
inline namespace.

- Enable upstream's hardened build mode.
Benjamin Barenblat <bbaren@google.com> not-needed
cpu-features.diff Canonicalize supported CPU feature set
Explicitly set supported CPU features.

- Disable Intel SSE and SSE2 on i386, since Debian supports some i386
processors without those extensions. Keep them enabled on amd64, since all
amd64 processors have them.

- Disable Intel SSSE3 entirely, since no i386 processor supports it and Debian
supports amd64 processors without it.

- Disable NEON on armel and armhf, since no armel processor supports NEON and
Debian supports some armhf processors without it. Keep it enabled on arm64,
since all arm64 processors have it.
Benjamin Barenblat <bbaren@google.com> not-needed
latomic.diff Use libatomic if necessary
On some architectures, notably armel, Abseil needs symbols defined in
libatomic. Abseil does not currently have a well-developed system to
declare external library dependencies, so just have the linker determine
if anything needs libatomic and add the DT_NEEDED entry where necessary.
Benjamin Barenblat <bbaren@google.com> no debian
empty-flags-library.diff Eliminate libabsl_flags.so and libabsl_flags.a
The libabsl_flags library only contains code when compiling with MSVC, which
Debian doesn't use. Skip compiling absl/flags/flag.cc, and make the Abseil flags
library header-only.
Benjamin Barenblat <bbaren@google.com> not-needed
leaky-pkgconfig-cflags.diff Do not leak -maes -msse4.1 into pkgconfig Bruno Pitrus <brunopitrus@hotmail.com> yes upstream, https://github.com/abseil/abseil-cpp/commit/09e96049995584c3489e4bd1467313e3e85af99c
cordz-info-statistics-test.diff no
CVE-2025-0838.patch [PATCH] Fix potential integer overflow in hash container create/resize

The sized constructors, reserve(), and rehash() methods of
absl::{flat,node}_hash_{set,map} did not impose an upper bound on
their size argument. As a result, it was possible for a caller to pass
a very large size that would cause an integer overflow when computing
the size of the container's backing store. Subsequent accesses to the
container might then access out-of-bounds memory.

The fix is in two parts:

1) Update max_size() to return the maximum number of items that can be
stored in the container

2) Validate the size arguments to the constructors, reserve(), and
rehash() methods, and abort the program when the argument is invalid

We've looked at uses of these containers in Google codebases like
Chrome, and determined this vulnerability is likely to be difficult to
exploit. This is primarily because container sizes are rarely
attacker-controlled.

The bug was discovered by Dmitry Vyukov <dvyukov@google.com>.
Derek Mauro <dmauro@google.com> no debian https://github.com/abseil/abseil-cpp/commit/5a0e2cb5e3958dd90bb8569a2766622cb74d90c1 2025-01-23

All known versions for source package 'abseil'

Links