Skip to content

Handle cases where passing an overly long size could cause UB due to integer overflow #54

Handle cases where passing an overly long size could cause UB due to integer overflow

Handle cases where passing an overly long size could cause UB due to integer overflow #54

Triggered via pull request October 16, 2025 08:35
Status Failure
Total duration 19m 5s
Artifacts

ci.yml

on: pull_request
Matrix: linux
Matrix: macos
Matrix: windows
Fit to window
Zoom out
Zoom in

Annotations

18 errors
linux (debian:bookworm, Release)
Process completed with exit code 2.
linux (fedora:40, Debug, g++, 14)
Process completed with exit code 2.
linux (debian:bookworm, clang++, clang)
Process completed with exit code 2.
linux (fedora:41, Debug, g++, 14)
Process completed with exit code 2.
linux (debian:testing, Debug, g++, 14)
Process completed with exit code 2.
linux (ubuntu:22.04, Debug, g++, 14)
Process completed with exit code 2.
linux (ubuntu:24.04, Debug, g++, 14)
Process completed with exit code 2.
linux (debian:bookworm, clang++, 17, clang)
Process completed with exit code 2.
linux (debian:bookworm, clang++, 17, clang, std::string_view)
Process completed with exit code 2.
linux (debian:bookworm, Debug, g++, 14)
Process completed with exit code 2.
linux (debian:testing, clang++, clang, -Wno-c++20-extensions)
Process completed with exit code 2.
linux (debian:experimental, Debug, g++, 14)
Process completed with exit code 2.
linux (debian:bookworm, 17)
Process completed with exit code 2.
linux (fedora:39, Debug, g++, 14)
Process completed with exit code 2.
linux (debian:experimental, clang++, clang, -Wno-c++20-extensions)
Process completed with exit code 2.
linux (debian:bookworm, clang++, 20, clang)
Process completed with exit code 2.
linux (debian:bookworm, 20)
Process completed with exit code 2.
ubuntu-latest
Process completed with exit code 2.