This bug was fixed in the package rapidjson - 1.1.0+dfsg2-7.3ubuntu1
---------------
rapidjson (1.1.0+dfsg2-7.3ubuntu1) plucky; urgency=medium
* SECURITY UPDATE: Integer underflow during JSON exponent parsing
- debian/patches/CVE-2024-38517.patch: prevent integer underflow when
parsing exponent.
- CVE-2024-38517
* Disable stringop-overflow warning when building unit tests (LP: #2089274)
- debian/patches/disable-spurious-overflow-warning.patch: disable
stringop-overflow warnings for test suite.
-- Octavio Galland <[email protected]> Mon, 25 Nov 2024
09:34:55 -0300
** Changed in: rapidjson (Ubuntu)
Status: New => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-38517
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2089274
Title:
rapidjson fails to build from source on plucky due to
`-Werror=stringop-overflow` in unittests
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rapidjson/+bug/2089274/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs