Two vulnerabilities have been reported in Boost, each one possibly resulting in a Denial of Service.
Package | dev-libs/boost on all architectures |
---|---|
Affected versions | < 1.34.1-r2 |
Unaffected versions | >= 1.34.1-r2 |
Boost is a set of C++ libraries, including the Boost.Regex library to process regular expressions.
Tavis Ormandy and Will Drewry from the Google Security Team reported a failed assertion in file regex/v4/perl_matcher_non_recursive.hpp (CVE-2008-0171) and a NULL pointer dereference in function get_repeat_type() file basic_regex_creator.hpp (CVE-2008-0172) when processing regular expressions.
A remote attacker could provide specially crafted regular expressions to an application using Boost, resulting in a crash.
There is no known workaround at this time.
All Boost users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/boost-1.34.1-r2"
Release date
February 14, 2008
Latest revision
February 14, 2008: 01
Severity
normal
Exploitable
remote
Bugzilla entries