Gentoo Logo

Boost: Denial of Service


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200802-08 / boost
Release Date February 14, 2008
Latest Revision February 14, 2008: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
dev-libs/boost < 1.34.1-r2 >= 1.34.1-r2 All supported architectures

Related bugreports: #205955


Two vulnerabilities have been reported in Boost, each one possibly resulting in a Denial of Service.

2.  Impact Information


Boost is a set of C++ libraries, including the Boost.Regex library to process regular expressions.


Tavis Ormandy and Will Drewry from the Google Security Team reported a failed assertion in file regex/v4/perl_matcher_non_recursive.hpp (CVE-2008-0171) and a NULL pointer dereference in function get_repeat_type() file basic_regex_creator.hpp (CVE-2008-0172) when processing regular expressions.


A remote attacker could provide specially crafted regular expressions to an application using Boost, resulting in a crash.

3.  Resolution Information


There is no known workaround at this time.


All Boost users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/boost-1.34.1-r2"

4.  References


Page updated February 14, 2008

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.