USN-570-1: boost vulnerabilities


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) USN-570-1: boost vulnerabilities
# 1  
Old 01-16-2008
USN-570-1: boost vulnerabilities

Referenced CVEs:
CVE-2008-0171, CVE-2008-0172


Description:
=========================================================== Ubuntu Security Notice USN-570-1 January 16, 2008boost vulnerabilitiesCVE-2008-0171, CVE-2008-0172===========================================================A security issue affects the following Ubuntu releases:Ubuntu 6.06 LTSUbuntu 6.10Ubuntu 7.04Ubuntu 7.10This advisory also applies to the corresponding versions ofKubuntu, Edubuntu, and Xubuntu.The problem can be corrected by upgrading your system to thefollowing package versions:Ubuntu 6.06 LTS: libboost-regex1.33.1 1.33.1-2ubuntu0.1Ubuntu 6.10: libboost-regex1.33.1 1.33.1-7ubuntu1.1Ubuntu 7.04: libboost-regex1.33.1 1.33.1-9ubuntu3.1Ubuntu 7.10: libboost-regex1.34.1 1.34.1-2ubuntu1.1In general, a standard system upgrade is sufficient to effect thenecessary changes.Details follow:Will Drewry and Tavis Ormandy discovered that the boost library did not properly perform input validation on regular expressions.An attacker could send a specially crafted regular expression toan application linked against boost and cause a denial of servicevia application crash.





More...
Login or Register to Ask a Question

Previous Thread | Next Thread

1 More Discussions You Might Find Interesting

1. Solaris

boost thread not accessible to boost::move error

Hi All I am working unders Sun Solaris and I am not "/opt/boost/boost/thread/detail/thread.hpp", line 344: Error: boost::thread::thread(boost::thread&) is not accessible from boost::move(boost::detail::thread_move_t<boost::thread>). Do you know if there are other solutions other than... (2 Replies)
Discussion started by: manustone
2 Replies
Login or Register to Ask a Question