Gentoo Logo

Boost: Denial of Service

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200802-08 / boost
Release Date February 14, 2008
Latest Revision February 14, 2008: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
dev-libs/boost < 1.34.1-r2 >= 1.34.1-r2 All supported architectures

Related bugreports: #205955

Synopsis

Two vulnerabilities have been reported in Boost, each one possibly resulting in a Denial of Service.

2.  Impact Information

Background

Boost is a set of C++ libraries, including the Boost.Regex library to process regular expressions.

Description

Tavis Ormandy and Will Drewry from the Google Security Team reported a failed assertion in file regex/v4/perl_matcher_non_recursive.hpp (CVE-2008-0171) and a NULL pointer dereference in function get_repeat_type() file basic_regex_creator.hpp (CVE-2008-0172) when processing regular expressions.

Impact

A remote attacker could provide specially crafted regular expressions to an application using Boost, resulting in a crash.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All Boost users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/boost-1.34.1-r2"

4.  References



Print

Page updated February 14, 2008

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.