This bug was fixed in the package rapidjson - 1.1.0+dfsg2-7.3ubuntu1

---------------
rapidjson (1.1.0+dfsg2-7.3ubuntu1) plucky; urgency=medium

  * SECURITY UPDATE: Integer underflow during JSON exponent parsing
    - debian/patches/CVE-2024-38517.patch: prevent integer underflow when
      parsing exponent.
    - CVE-2024-38517
  * Disable stringop-overflow warning when building unit tests (LP: #2089274)
    - debian/patches/disable-spurious-overflow-warning.patch: disable
      stringop-overflow warnings for test suite.

 -- Octavio Galland <[email protected]>  Mon, 25 Nov 2024
09:34:55 -0300

** Changed in: rapidjson (Ubuntu)
       Status: New => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-38517

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2089274

Title:
  rapidjson fails to build from source on plucky due to
  `-Werror=stringop-overflow` in unittests

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rapidjson/+bug/2089274/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to