Описание
ELSA-2013-0668: boost security update (MODERATE)
[1.41.0-15]
- Add in explicit dependences between some boost subpackages
[1.41.0-14]
- Build with -fno-strict-aliasing
[1.41.0-13]
- In Boost.Pool, be careful not to overflow allocated chunk size (boost-1.41.0-pool.patch)
[1.41.0-12]
- Add an upstream patch that fixes computation of CRC in zlib streams.
- Resolves: #707624
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
boost
1.33.1-16.el5_9
boost-devel
1.33.1-16.el5_9
boost-doc
1.33.1-16.el5_9
Oracle Linux x86_64
boost
1.33.1-16.el5_9
boost-devel
1.33.1-16.el5_9
boost-doc
1.33.1-16.el5_9
Oracle Linux i386
boost
1.33.1-16.el5_9
boost-devel
1.33.1-16.el5_9
boost-doc
1.33.1-16.el5_9
Oracle Linux 6
Oracle Linux x86_64
boost
1.41.0-15.el6_4
boost-date-time
1.41.0-15.el6_4
boost-devel
1.41.0-15.el6_4
boost-doc
1.41.0-15.el6_4
boost-filesystem
1.41.0-15.el6_4
boost-graph
1.41.0-15.el6_4
boost-graph-mpich2
1.41.0-15.el6_4
boost-graph-openmpi
1.41.0-15.el6_4
boost-iostreams
1.41.0-15.el6_4
boost-math
1.41.0-15.el6_4
boost-mpich2
1.41.0-15.el6_4
boost-mpich2-devel
1.41.0-15.el6_4
boost-mpich2-python
1.41.0-15.el6_4
boost-openmpi
1.41.0-15.el6_4
boost-openmpi-devel
1.41.0-15.el6_4
boost-openmpi-python
1.41.0-15.el6_4
boost-program-options
1.41.0-15.el6_4
boost-python
1.41.0-15.el6_4
boost-regex
1.41.0-15.el6_4
boost-serialization
1.41.0-15.el6_4
boost-signals
1.41.0-15.el6_4
boost-static
1.41.0-15.el6_4
boost-system
1.41.0-15.el6_4
boost-test
1.41.0-15.el6_4
boost-thread
1.41.0-15.el6_4
boost-wave
1.41.0-15.el6_4
Oracle Linux i686
boost
1.41.0-15.el6_4
boost-date-time
1.41.0-15.el6_4
boost-devel
1.41.0-15.el6_4
boost-doc
1.41.0-15.el6_4
boost-filesystem
1.41.0-15.el6_4
boost-graph
1.41.0-15.el6_4
boost-graph-mpich2
1.41.0-15.el6_4
boost-graph-openmpi
1.41.0-15.el6_4
boost-iostreams
1.41.0-15.el6_4
boost-math
1.41.0-15.el6_4
boost-mpich2
1.41.0-15.el6_4
boost-mpich2-devel
1.41.0-15.el6_4
boost-mpich2-python
1.41.0-15.el6_4
boost-openmpi
1.41.0-15.el6_4
boost-openmpi-devel
1.41.0-15.el6_4
boost-openmpi-python
1.41.0-15.el6_4
boost-program-options
1.41.0-15.el6_4
boost-python
1.41.0-15.el6_4
boost-regex
1.41.0-15.el6_4
boost-serialization
1.41.0-15.el6_4
boost-signals
1.41.0-15.el6_4
boost-static
1.41.0-15.el6_4
boost-system
1.41.0-15.el6_4
boost-test
1.41.0-15.el6_4
boost-thread
1.41.0-15.el6_4
boost-wave
1.41.0-15.el6_4
Связанные CVE
Связанные уязвимости
Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected.
Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected.
Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected.
Integer overflow in the ordered_malloc function in boost/pool/pool.hpp ...