• Bug#1083185: marked as done (rapidjson: CVE-2024-38517)

    From Debian Bug Tracking System@21:1/5 to All on Fri Apr 25 11:00:01 2025
    This is a multi-part message in MIME format...

    Your message dated Fri, 25 Apr 2025 08:55:11 +0000
    with message-id <E1u8Epz-004FdS-Oz@fasolo.debian.org>
    and subject line Bug#1083185: fixed in rapidjson 1.1.0+dfsg2-7.4
    has caused the Debian Bug report #1083185,
    regarding rapidjson: CVE-2024-38517
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    1083185: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1083185
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    Received: (at submit) by bugs.debian.org; 2 Oct 2024 20:30:26 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
    (2021-04-09) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-12.9 required=4.0 tests=BAYES_00,
    BODY_INCLUDES_PACKAGE,FOURLA,HAS_PACKAGE,SPF_HELO_NONE,SPF_PASS,
    SUBJ_LACKS_WORDS autolearn=ham autolearn_force=no
    version=3.4.6-bugs.debian.org_2005_01_02
    X-Spam-Bayes: score:0.0000 Tokens: new, 18; hammy, 130; neutral, 33; spammy,
    0. spammytokens: hammytokens:0.000-+--H*r:jmm,
    0.000-+--UD:security-tracker.debian.org,
    0.000-+--securitytrackerdebianorg,
    0.000-+--security-tracker.debian.org, 0.000-+--H*M:westfalen Return-path: <jmm@inutil.org>
    Received: from vps-b7ad3695.vps.ovh.net ([51.38.114.215]:43980)
    by buxtehude.debian.org with esmtps (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:2