From e748ba9741f6540f4675c23e3e37b73e822c13a4 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 31 May 2021 20:59:14 +0100 Subject: gentoo resync : 31.05.2021 --- metadata/glsa/glsa-202105-04.xml | 55 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 55 insertions(+) create mode 100644 metadata/glsa/glsa-202105-04.xml (limited to 'metadata/glsa/glsa-202105-04.xml') diff --git a/metadata/glsa/glsa-202105-04.xml b/metadata/glsa/glsa-202105-04.xml new file mode 100644 index 000000000000..6c92bcfc9a59 --- /dev/null +++ b/metadata/glsa/glsa-202105-04.xml @@ -0,0 +1,55 @@ + + + + Boost: Buffer overflow + A buffer overflow in Boost might allow remote attacker(s) to + execute arbitrary code. + + boost + 2021-05-26 + 2021-05-26 + 620468 + local, remote + + + 1.74.0-r2 + 1.74.0-r2 + + + +

Boost is a set of C++ libraries, including the Boost.Regex library to + process regular expressions. +

+
+ +

It was discovered that Boost incorrectly sanitized ‘next_size’ and + ‘max_size’ parameter in ordered_malloc() function when allocating + memory. +

+
+ +

A remote attacker could provide a specially crafted application-specific + file (requiring runtime memory allocation to be processed correctly), + that, when opened with an application using Boost C++ source libraries, + possibly resulting in execution of arbitrary code with the privileges of + the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Boost users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/boost-1.74.0-r2" + + +
+ + CVE-2012-2677 + + whissi + whissi +
-- cgit v1.2.3