[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2013-0668 -- Oracle boost

ID: oval:org.secpod.oval:def:1500131Date: (C)2013-03-26   (M)2023-12-07
Class: PATCHFamily: unix




Updated boost packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System base score,which gives a detailed severity rating, is available from the CVE link inthe References section. The boost packages provide free, peer-reviewed, portable C++ sourcelibraries with emphasis on libraries which work well with the C++ Standard Library. A flaw was found in the way the ordered_malloc routine in Boost sanitized the 'next_size' and 'max_size' parameters when allocating memory. If an application used the Boost C++ libraries for memory allocation, and performed memory allocation based on user-supplied input, an attacker could use this flaw to crash the application or, potentially, execute arbitrary code with the privileges of the user running the application. All users of boost are advised to upgrade to these updated packages, which contain a backported patch to fix this issue.

Platform:
Oracle Linux 6
Product:
boost
Reference:
ELSA-2013-0668
CVE-2012-2677
CVE    1
CVE-2012-2677
CPE    2
cpe:/a:boost:boost
cpe:/o:oracle:linux:6

© SecPod Technologies