Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-0668

Опубликовано: 21 мар. 2013
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2013-0668: boost security update (MODERATE)

[1.41.0-15]

  • Add in explicit dependences between some boost subpackages

[1.41.0-14]

  • Build with -fno-strict-aliasing

[1.41.0-13]

  • In Boost.Pool, be careful not to overflow allocated chunk size (boost-1.41.0-pool.patch)

[1.41.0-12]

  • Add an upstream patch that fixes computation of CRC in zlib streams.
  • Resolves: #707624

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

boost

1.33.1-16.el5_9

boost-devel

1.33.1-16.el5_9

boost-doc

1.33.1-16.el5_9

Oracle Linux x86_64

boost

1.33.1-16.el5_9

boost-devel

1.33.1-16.el5_9

boost-doc

1.33.1-16.el5_9

Oracle Linux i386

boost

1.33.1-16.el5_9

boost-devel

1.33.1-16.el5_9

boost-doc

1.33.1-16.el5_9

Oracle Linux 6

Oracle Linux x86_64

boost

1.41.0-15.el6_4

boost-date-time

1.41.0-15.el6_4

boost-devel

1.41.0-15.el6_4

boost-doc

1.41.0-15.el6_4

boost-filesystem

1.41.0-15.el6_4

boost-graph

1.41.0-15.el6_4

boost-graph-mpich2

1.41.0-15.el6_4

boost-graph-openmpi

1.41.0-15.el6_4

boost-iostreams

1.41.0-15.el6_4

boost-math

1.41.0-15.el6_4

boost-mpich2

1.41.0-15.el6_4

boost-mpich2-devel

1.41.0-15.el6_4

boost-mpich2-python

1.41.0-15.el6_4

boost-openmpi

1.41.0-15.el6_4

boost-openmpi-devel

1.41.0-15.el6_4

boost-openmpi-python

1.41.0-15.el6_4

boost-program-options

1.41.0-15.el6_4

boost-python

1.41.0-15.el6_4

boost-regex

1.41.0-15.el6_4

boost-serialization

1.41.0-15.el6_4

boost-signals

1.41.0-15.el6_4

boost-static

1.41.0-15.el6_4

boost-system

1.41.0-15.el6_4

boost-test

1.41.0-15.el6_4

boost-thread

1.41.0-15.el6_4

boost-wave

1.41.0-15.el6_4

Oracle Linux i686

boost

1.41.0-15.el6_4

boost-date-time

1.41.0-15.el6_4

boost-devel

1.41.0-15.el6_4

boost-doc

1.41.0-15.el6_4

boost-filesystem

1.41.0-15.el6_4

boost-graph

1.41.0-15.el6_4

boost-graph-mpich2

1.41.0-15.el6_4

boost-graph-openmpi

1.41.0-15.el6_4

boost-iostreams

1.41.0-15.el6_4

boost-math

1.41.0-15.el6_4

boost-mpich2

1.41.0-15.el6_4

boost-mpich2-devel

1.41.0-15.el6_4

boost-mpich2-python

1.41.0-15.el6_4

boost-openmpi

1.41.0-15.el6_4

boost-openmpi-devel

1.41.0-15.el6_4

boost-openmpi-python

1.41.0-15.el6_4

boost-program-options

1.41.0-15.el6_4

boost-python

1.41.0-15.el6_4

boost-regex

1.41.0-15.el6_4

boost-serialization

1.41.0-15.el6_4

boost-signals

1.41.0-15.el6_4

boost-static

1.41.0-15.el6_4

boost-system

1.41.0-15.el6_4

boost-test

1.41.0-15.el6_4

boost-thread

1.41.0-15.el6_4

boost-wave

1.41.0-15.el6_4

Связанные CVE

Связанные уязвимости

ubuntu
почти 13 лет назад

Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected.

redhat
около 13 лет назад

Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected.

nvd
почти 13 лет назад

Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected.

msrc
7 месяцев назад

Описание отсутствует

debian
почти 13 лет назад

Integer overflow in the ordered_malloc function in boost/pool/pool.hpp ...