Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-0172 (GCVE-0-2008-0172)
Vulnerability from cvelistv5 – Published: 2008-01-17 22:00 – Updated: 2024-08-07 07:39- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:39:32.901Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0063"
},
{
"name": "48099",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48099"
},
{
"name": "ADV-2008-0249",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0249"
},
{
"name": "27325",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/27325"
},
{
"name": "28860",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28860"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.boost.org/trac/boost/changeset/42745"
},
{
"name": "28943",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28943"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.boost.org/trac/boost/changeset/42674"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-2143"
},
{
"name": "FEDORA-2008-0880",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html"
},
{
"name": "28511",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28511"
},
{
"name": "20080213 rPSA-2008-0063-1 boost",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/488102/100/0/threaded"
},
{
"name": "28705",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28705"
},
{
"name": "28545",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28545"
},
{
"name": "SUSE-SR:2008:006",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html"
},
{
"name": "GLSA-200802-08",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml"
},
{
"name": "28527",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28527"
},
{
"name": "USN-570-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-570-1"
},
{
"name": "29323",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29323"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=205955"
},
{
"name": "MDVSA-2008:032",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-01-11T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0063"
},
{
"name": "48099",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48099"
},
{
"name": "ADV-2008-0249",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0249"
},
{
"name": "27325",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/27325"
},
{
"name": "28860",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28860"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.boost.org/trac/boost/changeset/42745"
},
{
"name": "28943",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28943"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.boost.org/trac/boost/changeset/42674"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-2143"
},
{
"name": "FEDORA-2008-0880",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html"
},
{
"name": "28511",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28511"
},
{
"name": "20080213 rPSA-2008-0063-1 boost",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/488102/100/0/threaded"
},
{
"name": "28705",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28705"
},
{
"name": "28545",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28545"
},
{
"name": "SUSE-SR:2008:006",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html"
},
{
"name": "GLSA-200802-08",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml"
},
{
"name": "28527",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28527"
},
{
"name": "USN-570-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-570-1"
},
{
"name": "29323",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29323"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=205955"
},
{
"name": "MDVSA-2008:032",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-0172",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0063",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0063"
},
{
"name": "48099",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48099"
},
{
"name": "ADV-2008-0249",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0249"
},
{
"name": "27325",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27325"
},
{
"name": "28860",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28860"
},
{
"name": "http://svn.boost.org/trac/boost/changeset/42745",
"refsource": "CONFIRM",
"url": "http://svn.boost.org/trac/boost/changeset/42745"
},
{
"name": "28943",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28943"
},
{
"name": "http://svn.boost.org/trac/boost/changeset/42674",
"refsource": "CONFIRM",
"url": "http://svn.boost.org/trac/boost/changeset/42674"
},
{
"name": "https://issues.rpath.com/browse/RPL-2143",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-2143"
},
{
"name": "FEDORA-2008-0880",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html"
},
{
"name": "28511",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28511"
},
{
"name": "20080213 rPSA-2008-0063-1 boost",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488102/100/0/threaded"
},
{
"name": "28705",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28705"
},
{
"name": "28545",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28545"
},
{
"name": "SUSE-SR:2008:006",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html"
},
{
"name": "GLSA-200802-08",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml"
},
{
"name": "28527",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28527"
},
{
"name": "USN-570-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-570-1"
},
{
"name": "29323",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29323"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=205955",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=205955"
},
{
"name": "MDVSA-2008:032",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-0172",
"datePublished": "2008-01-17T22:00:00.000Z",
"dateReserved": "2008-01-09T00:00:00.000Z",
"dateUpdated": "2024-08-07T07:39:32.901Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2008-0172",
"date": "2026-05-12",
"epss": "0.02168",
"percentile": "0.84454"
},
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8517E55-4357-4AFD-B571-5533123CB014\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33904E65-D50D-4EAE-885D-FE2EBF535F18\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9A940B9-A553-4A0B-8ECF-52FD26894285\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06FD8602-7069-41C6-B65C-84928EDCE2D6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boost:boost:1.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7A527FE-ED5E-4C9A-823C-0D76B1885691\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boost:boost:1.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9CAD8FD-3F47-4AA4-9B97-41892E58FB57\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n get_repeat_type en basic_regex_creator.hpp de la librer\\u00eda de expresiones regulares (tambi\\u00e9n conocido como Boost.Regex) de Boost 1.33 y 1.34 permite a atacantes remotos dependientes de contexto provocar una denegaci\\u00f3n de servicio (referencia nula y ca\\u00edda) mediante una expresi\\u00f3n regular inv\\u00e1lida.\"}]",
"id": "CVE-2008-0172",
"lastModified": "2024-11-21T00:41:19.950",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2008-01-17T23:00:00.000",
"references": "[{\"url\": \"http://bugs.gentoo.org/show_bug.cgi?id=205955\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/28511\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/28527\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/28545\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/28705\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/28860\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/28943\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/29323\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/48099\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://svn.boost.org/trac/boost/changeset/42674\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://svn.boost.org/trac/boost/changeset/42745\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://wiki.rpath.com/Advisories:rPSA-2008-0063\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/488102/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/27325\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-570-1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0249\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-2143\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://bugs.gentoo.org/show_bug.cgi?id=205955\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28511\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28527\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28545\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28705\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28860\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28943\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/29323\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/48099\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://svn.boost.org/trac/boost/changeset/42674\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://svn.boost.org/trac/boost/changeset/42745\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://wiki.rpath.com/Advisories:rPSA-2008-0063\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/488102/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/27325\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-570-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0249\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-2143\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vendorComments": "[{\"organization\": \"Red Hat\", \"comment\": \"This issue did not affect the version of boost as shipped with Red Hat Enterprise Linux 4.\\n\\nFor Red Hat Enterprise Linux 5, Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-0172\\n\\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.\", \"lastModified\": \"2008-05-12T00:00:00\"}]",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2008-0172\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-01-17T23:00:00.000\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n get_repeat_type en basic_regex_creator.hpp de la librer\u00eda de expresiones regulares (tambi\u00e9n conocido como Boost.Regex) de Boost 1.33 y 1.34 permite a atacantes remotos dependientes de contexto provocar una denegaci\u00f3n de servicio (referencia nula y ca\u00edda) mediante una expresi\u00f3n regular inv\u00e1lida.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8517E55-4357-4AFD-B571-5533123CB014\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33904E65-D50D-4EAE-885D-FE2EBF535F18\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A940B9-A553-4A0B-8ECF-52FD26894285\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06FD8602-7069-41C6-B65C-84928EDCE2D6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boost:boost:1.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7A527FE-ED5E-4C9A-823C-0D76B1885691\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boost:boost:1.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9CAD8FD-3F47-4AA4-9B97-41892E58FB57\"}]}]}],\"references\":[{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=205955\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/28511\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/28527\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/28545\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/28705\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/28860\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/28943\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/29323\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/48099\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://svn.boost.org/trac/boost/changeset/42674\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://svn.boost.org/trac/boost/changeset/42745\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2008-0063\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/488102/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/27325\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-570-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0249\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://issues.rpath.com/browse/RPL-2143\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=205955\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28511\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28527\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28545\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28860\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28943\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29323\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/48099\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.boost.org/trac/boost/changeset/42674\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.boost.org/trac/boost/changeset/42745\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2008-0063\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/488102/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/27325\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-570-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0249\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-2143\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"This issue did not affect the version of boost as shipped with Red Hat Enterprise Linux 4.\\n\\nFor Red Hat Enterprise Linux 5, Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-0172\\n\\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.\",\"lastModified\":\"2008-05-12T00:00:00\"}]}}"
}
}
GHSA-6RJV-3558-988C
Vulnerability from github – Published: 2022-05-01 23:28 – Updated: 2022-05-01 23:28The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.
{
"affected": [],
"aliases": [
"CVE-2008-0172"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2008-01-17T23:00:00Z",
"severity": "MODERATE"
},
"details": "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.",
"id": "GHSA-6rjv-3558-988c",
"modified": "2022-05-01T23:28:06Z",
"published": "2022-05-01T23:28:06Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0172"
},
{
"type": "WEB",
"url": "https://issues.rpath.com/browse/RPL-2143"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html"
},
{
"type": "WEB",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=205955"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28511"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28527"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28545"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28705"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28860"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28943"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29323"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/48099"
},
{
"type": "WEB",
"url": "http://svn.boost.org/trac/boost/changeset/42674"
},
{
"type": "WEB",
"url": "http://svn.boost.org/trac/boost/changeset/42745"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0063"
},
{
"type": "WEB",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/488102/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/27325"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-570-1"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/0249"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2008-0172
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2008-0172",
"description": "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.",
"id": "GSD-2008-0172",
"references": [
"https://www.suse.com/security/cve/CVE-2008-0172.html",
"https://access.redhat.com/errata/RHSA-2012:0305",
"https://linux.oracle.com/cve/CVE-2008-0172.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2008-0172"
],
"details": "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.",
"id": "GSD-2008-0172",
"modified": "2023-12-13T01:22:58.958372Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-0172",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0063",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0063"
},
{
"name": "48099",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48099"
},
{
"name": "ADV-2008-0249",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0249"
},
{
"name": "27325",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27325"
},
{
"name": "28860",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28860"
},
{
"name": "http://svn.boost.org/trac/boost/changeset/42745",
"refsource": "CONFIRM",
"url": "http://svn.boost.org/trac/boost/changeset/42745"
},
{
"name": "28943",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28943"
},
{
"name": "http://svn.boost.org/trac/boost/changeset/42674",
"refsource": "CONFIRM",
"url": "http://svn.boost.org/trac/boost/changeset/42674"
},
{
"name": "https://issues.rpath.com/browse/RPL-2143",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-2143"
},
{
"name": "FEDORA-2008-0880",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html"
},
{
"name": "28511",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28511"
},
{
"name": "20080213 rPSA-2008-0063-1 boost",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488102/100/0/threaded"
},
{
"name": "28705",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28705"
},
{
"name": "28545",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28545"
},
{
"name": "SUSE-SR:2008:006",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html"
},
{
"name": "GLSA-200802-08",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml"
},
{
"name": "28527",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28527"
},
{
"name": "USN-570-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-570-1"
},
{
"name": "29323",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29323"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=205955",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=205955"
},
{
"name": "MDVSA-2008:032",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:boost:boost:1.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:boost:boost:1.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-0172"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=205955",
"refsource": "CONFIRM",
"tags": [],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=205955"
},
{
"name": "http://svn.boost.org/trac/boost/changeset/42674",
"refsource": "CONFIRM",
"tags": [],
"url": "http://svn.boost.org/trac/boost/changeset/42674"
},
{
"name": "http://svn.boost.org/trac/boost/changeset/42745",
"refsource": "CONFIRM",
"tags": [],
"url": "http://svn.boost.org/trac/boost/changeset/42745"
},
{
"name": "https://issues.rpath.com/browse/RPL-2143",
"refsource": "CONFIRM",
"tags": [],
"url": "https://issues.rpath.com/browse/RPL-2143"
},
{
"name": "USN-570-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-570-1"
},
{
"name": "27325",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/27325"
},
{
"name": "FEDORA-2008-0880",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html"
},
{
"name": "28545",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28545"
},
{
"name": "MDVSA-2008:032",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032"
},
{
"name": "28705",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28705"
},
{
"name": "28511",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28511"
},
{
"name": "28527",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28527"
},
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0063",
"refsource": "CONFIRM",
"tags": [],
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0063"
},
{
"name": "GLSA-200802-08",
"refsource": "GENTOO",
"tags": [],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml"
},
{
"name": "28943",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28943"
},
{
"name": "28860",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28860"
},
{
"name": "SUSE-SR:2008:006",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html"
},
{
"name": "29323",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/29323"
},
{
"name": "ADV-2008-0249",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/0249"
},
{
"name": "48099",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/48099"
},
{
"name": "20080213 rPSA-2008-0063-1 boost",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/488102/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-15T21:58Z",
"publishedDate": "2008-01-17T23:00Z"
}
}
}
FKIE_CVE-2008-0172
Vulnerability from fkie_nvd - Published: 2008-01-17 23:00 - Updated: 2026-04-23 00:35| Vendor | Product | Version | |
|---|---|---|---|
| ubuntu | ubuntu_linux | 6.06_lts | |
| ubuntu | ubuntu_linux | 6.10 | |
| ubuntu | ubuntu_linux | 7.04 | |
| ubuntu | ubuntu_linux | 7.10 | |
| boost | boost | 1.33 | |
| boost | boost | 1.34 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*",
"matchCriteriaId": "B8517E55-4357-4AFD-B571-5533123CB014",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "33904E65-D50D-4EAE-885D-FE2EBF535F18",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A940B9-A553-4A0B-8ECF-52FD26894285",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "06FD8602-7069-41C6-B65C-84928EDCE2D6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:boost:boost:1.33:*:*:*:*:*:*:*",
"matchCriteriaId": "B7A527FE-ED5E-4C9A-823C-0D76B1885691",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:boost:boost:1.34:*:*:*:*:*:*:*",
"matchCriteriaId": "C9CAD8FD-3F47-4AA4-9B97-41892E58FB57",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression."
},
{
"lang": "es",
"value": "La funci\u00f3n get_repeat_type en basic_regex_creator.hpp de la librer\u00eda de expresiones regulares (tambi\u00e9n conocido como Boost.Regex) de Boost 1.33 y 1.34 permite a atacantes remotos dependientes de contexto provocar una denegaci\u00f3n de servicio (referencia nula y ca\u00edda) mediante una expresi\u00f3n regular inv\u00e1lida."
}
],
"id": "CVE-2008-0172",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-01-17T23:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=205955"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/28511"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/28527"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/28545"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/28705"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/28860"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/28943"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/29323"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/48099"
},
{
"source": "cve@mitre.org",
"url": "http://svn.boost.org/trac/boost/changeset/42674"
},
{
"source": "cve@mitre.org",
"url": "http://svn.boost.org/trac/boost/changeset/42745"
},
{
"source": "cve@mitre.org",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0063"
},
{
"source": "cve@mitre.org",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/488102/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/27325"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/usn-570-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/0249"
},
{
"source": "cve@mitre.org",
"url": "https://issues.rpath.com/browse/RPL-2143"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=205955"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28511"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28527"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28545"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28705"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28860"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28943"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29323"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/48099"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://svn.boost.org/trac/boost/changeset/42674"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://svn.boost.org/trac/boost/changeset/42745"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0063"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/488102/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/27325"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-570-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/0249"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-2143"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vendorComments": [
{
"comment": "This issue did not affect the version of boost as shipped with Red Hat Enterprise Linux 4.\n\nFor Red Hat Enterprise Linux 5, Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-0172\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.",
"lastModified": "2008-05-12T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
RHSA-2012_0305
Vulnerability from csaf_redhat - Published: 2012-02-21 02:20 - Updated: 2024-11-22 04:46regex/v4/perl_matcher_non_recursive.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (failed assertion and crash) via an invalid regular expression.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated boost packages that fix two security issues and two bugs are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The boost packages provide free, peer-reviewed, portable C++ source\nlibraries with emphasis on libraries which work well with the C++ Standard\nLibrary.\n\nInvalid pointer dereference flaws were found in the way the Boost regular\nexpression library processed certain, invalid expressions. An attacker able\nto make an application using the Boost library process a specially-crafted\nregular expression could cause that application to crash or, potentially,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2008-0171)\n\nNULL pointer dereference flaws were found in the way the Boost regular\nexpression library processed certain, invalid expressions. An attacker able\nto make an application using the Boost library process a specially-crafted\nregular expression could cause that application to crash. (CVE-2008-0172)\n\nRed Hat would like to thank Will Drewry for reporting these issues.\n\nThis update also fixes the following bugs:\n\n* Prior to this update, the construction of a regular expression object\ncould fail when several regular expression objects were created\nsimultaneously, such as in a multi-threaded program. With this update, the\nobject variables have been moved from the shared memory to the stack. Now,\nthe constructing function is thread safe. (BZ#472384)\n\n* Prior to this update, header files in several Boost libraries contained\npreprocessor directives that the GNU Compiler Collection (GCC) 4.4 could\nnot handle. This update instead uses equivalent constructs that are\nstandard C. (BZ#567722)\n\nAll users of boost are advised to upgrade to these updated packages, which\nfix these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0305",
"url": "https://access.redhat.com/errata/RHSA-2012:0305"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "428316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428316"
},
{
"category": "external",
"summary": "428320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428320"
},
{
"category": "external",
"summary": "472384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=472384"
},
{
"category": "external",
"summary": "567722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=567722"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0305.json"
}
],
"title": "Red Hat Security Advisory: boost security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T04:46:20+00:00",
"generator": {
"date": "2024-11-22T04:46:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2012:0305",
"initial_release_date": "2012-02-21T02:20:00+00:00",
"revision_history": [
{
"date": "2012-02-21T02:20:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-02-21T02:24:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:46:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-doc-0:1.33.1-15.el5.i386",
"product": {
"name": "boost-doc-0:1.33.1-15.el5.i386",
"product_id": "boost-doc-0:1.33.1-15.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-doc@1.33.1-15.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.33.1-15.el5.i386",
"product": {
"name": "boost-debuginfo-0:1.33.1-15.el5.i386",
"product_id": "boost-debuginfo-0:1.33.1-15.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.33.1-15.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.i386",
"product": {
"name": "boost-0:1.33.1-15.el5.i386",
"product_id": "boost-0:1.33.1-15.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "boost-devel-0:1.33.1-15.el5.i386",
"product": {
"name": "boost-devel-0:1.33.1-15.el5.i386",
"product_id": "boost-devel-0:1.33.1-15.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-devel@1.33.1-15.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-doc-0:1.33.1-15.el5.x86_64",
"product": {
"name": "boost-doc-0:1.33.1-15.el5.x86_64",
"product_id": "boost-doc-0:1.33.1-15.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-doc@1.33.1-15.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.33.1-15.el5.x86_64",
"product": {
"name": "boost-debuginfo-0:1.33.1-15.el5.x86_64",
"product_id": "boost-debuginfo-0:1.33.1-15.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.33.1-15.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.x86_64",
"product": {
"name": "boost-0:1.33.1-15.el5.x86_64",
"product_id": "boost-0:1.33.1-15.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-devel-0:1.33.1-15.el5.x86_64",
"product": {
"name": "boost-devel-0:1.33.1-15.el5.x86_64",
"product_id": "boost-devel-0:1.33.1-15.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-devel@1.33.1-15.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.src",
"product": {
"name": "boost-0:1.33.1-15.el5.src",
"product_id": "boost-0:1.33.1-15.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-devel-0:1.33.1-15.el5.ia64",
"product": {
"name": "boost-devel-0:1.33.1-15.el5.ia64",
"product_id": "boost-devel-0:1.33.1-15.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-devel@1.33.1-15.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "boost-doc-0:1.33.1-15.el5.ia64",
"product": {
"name": "boost-doc-0:1.33.1-15.el5.ia64",
"product_id": "boost-doc-0:1.33.1-15.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-doc@1.33.1-15.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.33.1-15.el5.ia64",
"product": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ia64",
"product_id": "boost-debuginfo-0:1.33.1-15.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.33.1-15.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.ia64",
"product": {
"name": "boost-0:1.33.1-15.el5.ia64",
"product_id": "boost-0:1.33.1-15.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-devel-0:1.33.1-15.el5.ppc64",
"product": {
"name": "boost-devel-0:1.33.1-15.el5.ppc64",
"product_id": "boost-devel-0:1.33.1-15.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-devel@1.33.1-15.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc64",
"product": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc64",
"product_id": "boost-debuginfo-0:1.33.1-15.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.33.1-15.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.ppc64",
"product": {
"name": "boost-0:1.33.1-15.el5.ppc64",
"product_id": "boost-0:1.33.1-15.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-devel-0:1.33.1-15.el5.ppc",
"product": {
"name": "boost-devel-0:1.33.1-15.el5.ppc",
"product_id": "boost-devel-0:1.33.1-15.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-devel@1.33.1-15.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "boost-doc-0:1.33.1-15.el5.ppc",
"product": {
"name": "boost-doc-0:1.33.1-15.el5.ppc",
"product_id": "boost-doc-0:1.33.1-15.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-doc@1.33.1-15.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc",
"product": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc",
"product_id": "boost-debuginfo-0:1.33.1-15.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.33.1-15.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.ppc",
"product": {
"name": "boost-0:1.33.1-15.el5.ppc",
"product_id": "boost-0:1.33.1-15.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-devel-0:1.33.1-15.el5.s390x",
"product": {
"name": "boost-devel-0:1.33.1-15.el5.s390x",
"product_id": "boost-devel-0:1.33.1-15.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-devel@1.33.1-15.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "boost-doc-0:1.33.1-15.el5.s390x",
"product": {
"name": "boost-doc-0:1.33.1-15.el5.s390x",
"product_id": "boost-doc-0:1.33.1-15.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-doc@1.33.1-15.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.33.1-15.el5.s390x",
"product": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390x",
"product_id": "boost-debuginfo-0:1.33.1-15.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.33.1-15.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.s390x",
"product": {
"name": "boost-0:1.33.1-15.el5.s390x",
"product_id": "boost-0:1.33.1-15.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-devel-0:1.33.1-15.el5.s390",
"product": {
"name": "boost-devel-0:1.33.1-15.el5.s390",
"product_id": "boost-devel-0:1.33.1-15.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-devel@1.33.1-15.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.33.1-15.el5.s390",
"product": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390",
"product_id": "boost-debuginfo-0:1.33.1-15.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.33.1-15.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.s390",
"product": {
"name": "boost-0:1.33.1-15.el5.s390",
"product_id": "boost-0:1.33.1-15.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.src"
},
"product_reference": "boost-0:1.33.1-15.el5.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.src"
},
"product_reference": "boost-0:1.33.1-15.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-debuginfo-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-debuginfo-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-debuginfo-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-debuginfo-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-debuginfo-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-devel-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-devel-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-devel-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-devel-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-devel-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-devel-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-devel-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-doc-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-doc-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-doc-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-doc-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-doc-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.src"
},
"product_reference": "boost-0:1.33.1-15.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-debuginfo-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-debuginfo-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-debuginfo-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-debuginfo-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-debuginfo-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-devel-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-devel-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-devel-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-devel-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-devel-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-devel-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-devel-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-doc-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-doc-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-doc-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-doc-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-doc-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Will Drewry"
]
}
],
"cve": "CVE-2008-0171",
"discovery_date": "2008-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "428316"
}
],
"notes": [
{
"category": "description",
"text": "regex/v4/perl_matcher_non_recursive.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (failed assertion and crash) via an invalid regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "boost regular expression memory corruption flaws",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of boost as shipped with Red Hat Enterprise Linux 4 and 6. This issue was addressed in boost packages in Red Hat Enterprise Linux 5 via RHSA-2012:0305.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:boost-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-0:1.33.1-15.el5.src",
"5Client-Workstation:boost-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64",
"5Client:boost-0:1.33.1-15.el5.i386",
"5Client:boost-0:1.33.1-15.el5.ia64",
"5Client:boost-0:1.33.1-15.el5.ppc",
"5Client:boost-0:1.33.1-15.el5.ppc64",
"5Client:boost-0:1.33.1-15.el5.s390",
"5Client:boost-0:1.33.1-15.el5.s390x",
"5Client:boost-0:1.33.1-15.el5.src",
"5Client:boost-0:1.33.1-15.el5.x86_64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client:boost-devel-0:1.33.1-15.el5.i386",
"5Client:boost-devel-0:1.33.1-15.el5.ia64",
"5Client:boost-devel-0:1.33.1-15.el5.ppc",
"5Client:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client:boost-devel-0:1.33.1-15.el5.s390",
"5Client:boost-devel-0:1.33.1-15.el5.s390x",
"5Client:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client:boost-doc-0:1.33.1-15.el5.i386",
"5Client:boost-doc-0:1.33.1-15.el5.ia64",
"5Client:boost-doc-0:1.33.1-15.el5.ppc",
"5Client:boost-doc-0:1.33.1-15.el5.s390x",
"5Client:boost-doc-0:1.33.1-15.el5.x86_64",
"5Server:boost-0:1.33.1-15.el5.i386",
"5Server:boost-0:1.33.1-15.el5.ia64",
"5Server:boost-0:1.33.1-15.el5.ppc",
"5Server:boost-0:1.33.1-15.el5.ppc64",
"5Server:boost-0:1.33.1-15.el5.s390",
"5Server:boost-0:1.33.1-15.el5.s390x",
"5Server:boost-0:1.33.1-15.el5.src",
"5Server:boost-0:1.33.1-15.el5.x86_64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Server:boost-devel-0:1.33.1-15.el5.i386",
"5Server:boost-devel-0:1.33.1-15.el5.ia64",
"5Server:boost-devel-0:1.33.1-15.el5.ppc",
"5Server:boost-devel-0:1.33.1-15.el5.ppc64",
"5Server:boost-devel-0:1.33.1-15.el5.s390",
"5Server:boost-devel-0:1.33.1-15.el5.s390x",
"5Server:boost-devel-0:1.33.1-15.el5.x86_64",
"5Server:boost-doc-0:1.33.1-15.el5.i386",
"5Server:boost-doc-0:1.33.1-15.el5.ia64",
"5Server:boost-doc-0:1.33.1-15.el5.ppc",
"5Server:boost-doc-0:1.33.1-15.el5.s390x",
"5Server:boost-doc-0:1.33.1-15.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0171"
},
{
"category": "external",
"summary": "RHBZ#428316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428316"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0171",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0171"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0171",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0171"
}
],
"release_date": "2008-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-21T02:20:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:boost-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-0:1.33.1-15.el5.src",
"5Client-Workstation:boost-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64",
"5Client:boost-0:1.33.1-15.el5.i386",
"5Client:boost-0:1.33.1-15.el5.ia64",
"5Client:boost-0:1.33.1-15.el5.ppc",
"5Client:boost-0:1.33.1-15.el5.ppc64",
"5Client:boost-0:1.33.1-15.el5.s390",
"5Client:boost-0:1.33.1-15.el5.s390x",
"5Client:boost-0:1.33.1-15.el5.src",
"5Client:boost-0:1.33.1-15.el5.x86_64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client:boost-devel-0:1.33.1-15.el5.i386",
"5Client:boost-devel-0:1.33.1-15.el5.ia64",
"5Client:boost-devel-0:1.33.1-15.el5.ppc",
"5Client:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client:boost-devel-0:1.33.1-15.el5.s390",
"5Client:boost-devel-0:1.33.1-15.el5.s390x",
"5Client:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client:boost-doc-0:1.33.1-15.el5.i386",
"5Client:boost-doc-0:1.33.1-15.el5.ia64",
"5Client:boost-doc-0:1.33.1-15.el5.ppc",
"5Client:boost-doc-0:1.33.1-15.el5.s390x",
"5Client:boost-doc-0:1.33.1-15.el5.x86_64",
"5Server:boost-0:1.33.1-15.el5.i386",
"5Server:boost-0:1.33.1-15.el5.ia64",
"5Server:boost-0:1.33.1-15.el5.ppc",
"5Server:boost-0:1.33.1-15.el5.ppc64",
"5Server:boost-0:1.33.1-15.el5.s390",
"5Server:boost-0:1.33.1-15.el5.s390x",
"5Server:boost-0:1.33.1-15.el5.src",
"5Server:boost-0:1.33.1-15.el5.x86_64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Server:boost-devel-0:1.33.1-15.el5.i386",
"5Server:boost-devel-0:1.33.1-15.el5.ia64",
"5Server:boost-devel-0:1.33.1-15.el5.ppc",
"5Server:boost-devel-0:1.33.1-15.el5.ppc64",
"5Server:boost-devel-0:1.33.1-15.el5.s390",
"5Server:boost-devel-0:1.33.1-15.el5.s390x",
"5Server:boost-devel-0:1.33.1-15.el5.x86_64",
"5Server:boost-doc-0:1.33.1-15.el5.i386",
"5Server:boost-doc-0:1.33.1-15.el5.ia64",
"5Server:boost-doc-0:1.33.1-15.el5.ppc",
"5Server:boost-doc-0:1.33.1-15.el5.s390x",
"5Server:boost-doc-0:1.33.1-15.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Workstation:boost-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-0:1.33.1-15.el5.src",
"5Client-Workstation:boost-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64",
"5Client:boost-0:1.33.1-15.el5.i386",
"5Client:boost-0:1.33.1-15.el5.ia64",
"5Client:boost-0:1.33.1-15.el5.ppc",
"5Client:boost-0:1.33.1-15.el5.ppc64",
"5Client:boost-0:1.33.1-15.el5.s390",
"5Client:boost-0:1.33.1-15.el5.s390x",
"5Client:boost-0:1.33.1-15.el5.src",
"5Client:boost-0:1.33.1-15.el5.x86_64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client:boost-devel-0:1.33.1-15.el5.i386",
"5Client:boost-devel-0:1.33.1-15.el5.ia64",
"5Client:boost-devel-0:1.33.1-15.el5.ppc",
"5Client:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client:boost-devel-0:1.33.1-15.el5.s390",
"5Client:boost-devel-0:1.33.1-15.el5.s390x",
"5Client:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client:boost-doc-0:1.33.1-15.el5.i386",
"5Client:boost-doc-0:1.33.1-15.el5.ia64",
"5Client:boost-doc-0:1.33.1-15.el5.ppc",
"5Client:boost-doc-0:1.33.1-15.el5.s390x",
"5Client:boost-doc-0:1.33.1-15.el5.x86_64",
"5Server:boost-0:1.33.1-15.el5.i386",
"5Server:boost-0:1.33.1-15.el5.ia64",
"5Server:boost-0:1.33.1-15.el5.ppc",
"5Server:boost-0:1.33.1-15.el5.ppc64",
"5Server:boost-0:1.33.1-15.el5.s390",
"5Server:boost-0:1.33.1-15.el5.s390x",
"5Server:boost-0:1.33.1-15.el5.src",
"5Server:boost-0:1.33.1-15.el5.x86_64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Server:boost-devel-0:1.33.1-15.el5.i386",
"5Server:boost-devel-0:1.33.1-15.el5.ia64",
"5Server:boost-devel-0:1.33.1-15.el5.ppc",
"5Server:boost-devel-0:1.33.1-15.el5.ppc64",
"5Server:boost-devel-0:1.33.1-15.el5.s390",
"5Server:boost-devel-0:1.33.1-15.el5.s390x",
"5Server:boost-devel-0:1.33.1-15.el5.x86_64",
"5Server:boost-doc-0:1.33.1-15.el5.i386",
"5Server:boost-doc-0:1.33.1-15.el5.ia64",
"5Server:boost-doc-0:1.33.1-15.el5.ppc",
"5Server:boost-doc-0:1.33.1-15.el5.s390x",
"5Server:boost-doc-0:1.33.1-15.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "boost regular expression memory corruption flaws"
},
{
"acknowledgments": [
{
"names": [
"Will Drewry"
]
}
],
"cve": "CVE-2008-0172",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2008-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "428320"
}
],
"notes": [
{
"category": "description",
"text": "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "boost regular expression NULL dereference flaw",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of boost as shipped with Red Hat Enterprise Linux 4 and 6. This issue was addressed in boost packages in Red Hat Enterprise Linux 5 via RHSA-2012:0305.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:boost-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-0:1.33.1-15.el5.src",
"5Client-Workstation:boost-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64",
"5Client:boost-0:1.33.1-15.el5.i386",
"5Client:boost-0:1.33.1-15.el5.ia64",
"5Client:boost-0:1.33.1-15.el5.ppc",
"5Client:boost-0:1.33.1-15.el5.ppc64",
"5Client:boost-0:1.33.1-15.el5.s390",
"5Client:boost-0:1.33.1-15.el5.s390x",
"5Client:boost-0:1.33.1-15.el5.src",
"5Client:boost-0:1.33.1-15.el5.x86_64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client:boost-devel-0:1.33.1-15.el5.i386",
"5Client:boost-devel-0:1.33.1-15.el5.ia64",
"5Client:boost-devel-0:1.33.1-15.el5.ppc",
"5Client:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client:boost-devel-0:1.33.1-15.el5.s390",
"5Client:boost-devel-0:1.33.1-15.el5.s390x",
"5Client:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client:boost-doc-0:1.33.1-15.el5.i386",
"5Client:boost-doc-0:1.33.1-15.el5.ia64",
"5Client:boost-doc-0:1.33.1-15.el5.ppc",
"5Client:boost-doc-0:1.33.1-15.el5.s390x",
"5Client:boost-doc-0:1.33.1-15.el5.x86_64",
"5Server:boost-0:1.33.1-15.el5.i386",
"5Server:boost-0:1.33.1-15.el5.ia64",
"5Server:boost-0:1.33.1-15.el5.ppc",
"5Server:boost-0:1.33.1-15.el5.ppc64",
"5Server:boost-0:1.33.1-15.el5.s390",
"5Server:boost-0:1.33.1-15.el5.s390x",
"5Server:boost-0:1.33.1-15.el5.src",
"5Server:boost-0:1.33.1-15.el5.x86_64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Server:boost-devel-0:1.33.1-15.el5.i386",
"5Server:boost-devel-0:1.33.1-15.el5.ia64",
"5Server:boost-devel-0:1.33.1-15.el5.ppc",
"5Server:boost-devel-0:1.33.1-15.el5.ppc64",
"5Server:boost-devel-0:1.33.1-15.el5.s390",
"5Server:boost-devel-0:1.33.1-15.el5.s390x",
"5Server:boost-devel-0:1.33.1-15.el5.x86_64",
"5Server:boost-doc-0:1.33.1-15.el5.i386",
"5Server:boost-doc-0:1.33.1-15.el5.ia64",
"5Server:boost-doc-0:1.33.1-15.el5.ppc",
"5Server:boost-doc-0:1.33.1-15.el5.s390x",
"5Server:boost-doc-0:1.33.1-15.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0172"
},
{
"category": "external",
"summary": "RHBZ#428320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428320"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0172"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0172",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0172"
}
],
"release_date": "2008-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-21T02:20:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:boost-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-0:1.33.1-15.el5.src",
"5Client-Workstation:boost-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64",
"5Client:boost-0:1.33.1-15.el5.i386",
"5Client:boost-0:1.33.1-15.el5.ia64",
"5Client:boost-0:1.33.1-15.el5.ppc",
"5Client:boost-0:1.33.1-15.el5.ppc64",
"5Client:boost-0:1.33.1-15.el5.s390",
"5Client:boost-0:1.33.1-15.el5.s390x",
"5Client:boost-0:1.33.1-15.el5.src",
"5Client:boost-0:1.33.1-15.el5.x86_64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client:boost-devel-0:1.33.1-15.el5.i386",
"5Client:boost-devel-0:1.33.1-15.el5.ia64",
"5Client:boost-devel-0:1.33.1-15.el5.ppc",
"5Client:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client:boost-devel-0:1.33.1-15.el5.s390",
"5Client:boost-devel-0:1.33.1-15.el5.s390x",
"5Client:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client:boost-doc-0:1.33.1-15.el5.i386",
"5Client:boost-doc-0:1.33.1-15.el5.ia64",
"5Client:boost-doc-0:1.33.1-15.el5.ppc",
"5Client:boost-doc-0:1.33.1-15.el5.s390x",
"5Client:boost-doc-0:1.33.1-15.el5.x86_64",
"5Server:boost-0:1.33.1-15.el5.i386",
"5Server:boost-0:1.33.1-15.el5.ia64",
"5Server:boost-0:1.33.1-15.el5.ppc",
"5Server:boost-0:1.33.1-15.el5.ppc64",
"5Server:boost-0:1.33.1-15.el5.s390",
"5Server:boost-0:1.33.1-15.el5.s390x",
"5Server:boost-0:1.33.1-15.el5.src",
"5Server:boost-0:1.33.1-15.el5.x86_64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Server:boost-devel-0:1.33.1-15.el5.i386",
"5Server:boost-devel-0:1.33.1-15.el5.ia64",
"5Server:boost-devel-0:1.33.1-15.el5.ppc",
"5Server:boost-devel-0:1.33.1-15.el5.ppc64",
"5Server:boost-devel-0:1.33.1-15.el5.s390",
"5Server:boost-devel-0:1.33.1-15.el5.s390x",
"5Server:boost-devel-0:1.33.1-15.el5.x86_64",
"5Server:boost-doc-0:1.33.1-15.el5.i386",
"5Server:boost-doc-0:1.33.1-15.el5.ia64",
"5Server:boost-doc-0:1.33.1-15.el5.ppc",
"5Server:boost-doc-0:1.33.1-15.el5.s390x",
"5Server:boost-doc-0:1.33.1-15.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Workstation:boost-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-0:1.33.1-15.el5.src",
"5Client-Workstation:boost-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64",
"5Client:boost-0:1.33.1-15.el5.i386",
"5Client:boost-0:1.33.1-15.el5.ia64",
"5Client:boost-0:1.33.1-15.el5.ppc",
"5Client:boost-0:1.33.1-15.el5.ppc64",
"5Client:boost-0:1.33.1-15.el5.s390",
"5Client:boost-0:1.33.1-15.el5.s390x",
"5Client:boost-0:1.33.1-15.el5.src",
"5Client:boost-0:1.33.1-15.el5.x86_64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client:boost-devel-0:1.33.1-15.el5.i386",
"5Client:boost-devel-0:1.33.1-15.el5.ia64",
"5Client:boost-devel-0:1.33.1-15.el5.ppc",
"5Client:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client:boost-devel-0:1.33.1-15.el5.s390",
"5Client:boost-devel-0:1.33.1-15.el5.s390x",
"5Client:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client:boost-doc-0:1.33.1-15.el5.i386",
"5Client:boost-doc-0:1.33.1-15.el5.ia64",
"5Client:boost-doc-0:1.33.1-15.el5.ppc",
"5Client:boost-doc-0:1.33.1-15.el5.s390x",
"5Client:boost-doc-0:1.33.1-15.el5.x86_64",
"5Server:boost-0:1.33.1-15.el5.i386",
"5Server:boost-0:1.33.1-15.el5.ia64",
"5Server:boost-0:1.33.1-15.el5.ppc",
"5Server:boost-0:1.33.1-15.el5.ppc64",
"5Server:boost-0:1.33.1-15.el5.s390",
"5Server:boost-0:1.33.1-15.el5.s390x",
"5Server:boost-0:1.33.1-15.el5.src",
"5Server:boost-0:1.33.1-15.el5.x86_64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Server:boost-devel-0:1.33.1-15.el5.i386",
"5Server:boost-devel-0:1.33.1-15.el5.ia64",
"5Server:boost-devel-0:1.33.1-15.el5.ppc",
"5Server:boost-devel-0:1.33.1-15.el5.ppc64",
"5Server:boost-devel-0:1.33.1-15.el5.s390",
"5Server:boost-devel-0:1.33.1-15.el5.s390x",
"5Server:boost-devel-0:1.33.1-15.el5.x86_64",
"5Server:boost-doc-0:1.33.1-15.el5.i386",
"5Server:boost-doc-0:1.33.1-15.el5.ia64",
"5Server:boost-doc-0:1.33.1-15.el5.ppc",
"5Server:boost-doc-0:1.33.1-15.el5.s390x",
"5Server:boost-doc-0:1.33.1-15.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "boost regular expression NULL dereference flaw"
}
]
}
RHSA-2012:0305
Vulnerability from csaf_redhat - Published: 2012-02-21 02:20 - Updated: 2025-11-21 17:39regex/v4/perl_matcher_non_recursive.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (failed assertion and crash) via an invalid regular expression.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-devel-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:boost-doc-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-devel-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:boost-doc-0:1.33.1-15.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated boost packages that fix two security issues and two bugs are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The boost packages provide free, peer-reviewed, portable C++ source\nlibraries with emphasis on libraries which work well with the C++ Standard\nLibrary.\n\nInvalid pointer dereference flaws were found in the way the Boost regular\nexpression library processed certain, invalid expressions. An attacker able\nto make an application using the Boost library process a specially-crafted\nregular expression could cause that application to crash or, potentially,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2008-0171)\n\nNULL pointer dereference flaws were found in the way the Boost regular\nexpression library processed certain, invalid expressions. An attacker able\nto make an application using the Boost library process a specially-crafted\nregular expression could cause that application to crash. (CVE-2008-0172)\n\nRed Hat would like to thank Will Drewry for reporting these issues.\n\nThis update also fixes the following bugs:\n\n* Prior to this update, the construction of a regular expression object\ncould fail when several regular expression objects were created\nsimultaneously, such as in a multi-threaded program. With this update, the\nobject variables have been moved from the shared memory to the stack. Now,\nthe constructing function is thread safe. (BZ#472384)\n\n* Prior to this update, header files in several Boost libraries contained\npreprocessor directives that the GNU Compiler Collection (GCC) 4.4 could\nnot handle. This update instead uses equivalent constructs that are\nstandard C. (BZ#567722)\n\nAll users of boost are advised to upgrade to these updated packages, which\nfix these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0305",
"url": "https://access.redhat.com/errata/RHSA-2012:0305"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "428316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428316"
},
{
"category": "external",
"summary": "428320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428320"
},
{
"category": "external",
"summary": "472384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=472384"
},
{
"category": "external",
"summary": "567722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=567722"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0305.json"
}
],
"title": "Red Hat Security Advisory: boost security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:39:55+00:00",
"generator": {
"date": "2025-11-21T17:39:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2012:0305",
"initial_release_date": "2012-02-21T02:20:00+00:00",
"revision_history": [
{
"date": "2012-02-21T02:20:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-02-21T02:24:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:39:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-doc-0:1.33.1-15.el5.i386",
"product": {
"name": "boost-doc-0:1.33.1-15.el5.i386",
"product_id": "boost-doc-0:1.33.1-15.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-doc@1.33.1-15.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.33.1-15.el5.i386",
"product": {
"name": "boost-debuginfo-0:1.33.1-15.el5.i386",
"product_id": "boost-debuginfo-0:1.33.1-15.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.33.1-15.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.i386",
"product": {
"name": "boost-0:1.33.1-15.el5.i386",
"product_id": "boost-0:1.33.1-15.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "boost-devel-0:1.33.1-15.el5.i386",
"product": {
"name": "boost-devel-0:1.33.1-15.el5.i386",
"product_id": "boost-devel-0:1.33.1-15.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-devel@1.33.1-15.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-doc-0:1.33.1-15.el5.x86_64",
"product": {
"name": "boost-doc-0:1.33.1-15.el5.x86_64",
"product_id": "boost-doc-0:1.33.1-15.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-doc@1.33.1-15.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.33.1-15.el5.x86_64",
"product": {
"name": "boost-debuginfo-0:1.33.1-15.el5.x86_64",
"product_id": "boost-debuginfo-0:1.33.1-15.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.33.1-15.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.x86_64",
"product": {
"name": "boost-0:1.33.1-15.el5.x86_64",
"product_id": "boost-0:1.33.1-15.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-devel-0:1.33.1-15.el5.x86_64",
"product": {
"name": "boost-devel-0:1.33.1-15.el5.x86_64",
"product_id": "boost-devel-0:1.33.1-15.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-devel@1.33.1-15.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.src",
"product": {
"name": "boost-0:1.33.1-15.el5.src",
"product_id": "boost-0:1.33.1-15.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-devel-0:1.33.1-15.el5.ia64",
"product": {
"name": "boost-devel-0:1.33.1-15.el5.ia64",
"product_id": "boost-devel-0:1.33.1-15.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-devel@1.33.1-15.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "boost-doc-0:1.33.1-15.el5.ia64",
"product": {
"name": "boost-doc-0:1.33.1-15.el5.ia64",
"product_id": "boost-doc-0:1.33.1-15.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-doc@1.33.1-15.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.33.1-15.el5.ia64",
"product": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ia64",
"product_id": "boost-debuginfo-0:1.33.1-15.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.33.1-15.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.ia64",
"product": {
"name": "boost-0:1.33.1-15.el5.ia64",
"product_id": "boost-0:1.33.1-15.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-devel-0:1.33.1-15.el5.ppc64",
"product": {
"name": "boost-devel-0:1.33.1-15.el5.ppc64",
"product_id": "boost-devel-0:1.33.1-15.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-devel@1.33.1-15.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc64",
"product": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc64",
"product_id": "boost-debuginfo-0:1.33.1-15.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.33.1-15.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.ppc64",
"product": {
"name": "boost-0:1.33.1-15.el5.ppc64",
"product_id": "boost-0:1.33.1-15.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-devel-0:1.33.1-15.el5.ppc",
"product": {
"name": "boost-devel-0:1.33.1-15.el5.ppc",
"product_id": "boost-devel-0:1.33.1-15.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-devel@1.33.1-15.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "boost-doc-0:1.33.1-15.el5.ppc",
"product": {
"name": "boost-doc-0:1.33.1-15.el5.ppc",
"product_id": "boost-doc-0:1.33.1-15.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-doc@1.33.1-15.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc",
"product": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc",
"product_id": "boost-debuginfo-0:1.33.1-15.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.33.1-15.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.ppc",
"product": {
"name": "boost-0:1.33.1-15.el5.ppc",
"product_id": "boost-0:1.33.1-15.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-devel-0:1.33.1-15.el5.s390x",
"product": {
"name": "boost-devel-0:1.33.1-15.el5.s390x",
"product_id": "boost-devel-0:1.33.1-15.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-devel@1.33.1-15.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "boost-doc-0:1.33.1-15.el5.s390x",
"product": {
"name": "boost-doc-0:1.33.1-15.el5.s390x",
"product_id": "boost-doc-0:1.33.1-15.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-doc@1.33.1-15.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.33.1-15.el5.s390x",
"product": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390x",
"product_id": "boost-debuginfo-0:1.33.1-15.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.33.1-15.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.s390x",
"product": {
"name": "boost-0:1.33.1-15.el5.s390x",
"product_id": "boost-0:1.33.1-15.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "boost-devel-0:1.33.1-15.el5.s390",
"product": {
"name": "boost-devel-0:1.33.1-15.el5.s390",
"product_id": "boost-devel-0:1.33.1-15.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-devel@1.33.1-15.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.33.1-15.el5.s390",
"product": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390",
"product_id": "boost-debuginfo-0:1.33.1-15.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.33.1-15.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.33.1-15.el5.s390",
"product": {
"name": "boost-0:1.33.1-15.el5.s390",
"product_id": "boost-0:1.33.1-15.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.33.1-15.el5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.src"
},
"product_reference": "boost-0:1.33.1-15.el5.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.src"
},
"product_reference": "boost-0:1.33.1-15.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-debuginfo-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-debuginfo-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-debuginfo-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-debuginfo-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-debuginfo-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-devel-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-devel-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-devel-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-devel-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-devel-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-devel-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-devel-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-doc-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-doc-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-doc-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-doc-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:boost-doc-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.src"
},
"product_reference": "boost-0:1.33.1-15.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-debuginfo-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-debuginfo-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-debuginfo-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-debuginfo-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-debuginfo-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-debuginfo-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-devel-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-devel-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-devel-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-devel-0:1.33.1-15.el5.ppc64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-devel-0:1.33.1-15.el5.s390"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-devel-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-devel-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-devel-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-devel-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-doc-0:1.33.1-15.el5.i386"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-doc-0:1.33.1-15.el5.ia64"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-doc-0:1.33.1-15.el5.ppc"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-doc-0:1.33.1-15.el5.s390x"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doc-0:1.33.1-15.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:boost-doc-0:1.33.1-15.el5.x86_64"
},
"product_reference": "boost-doc-0:1.33.1-15.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Will Drewry"
]
}
],
"cve": "CVE-2008-0171",
"discovery_date": "2008-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "428316"
}
],
"notes": [
{
"category": "description",
"text": "regex/v4/perl_matcher_non_recursive.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (failed assertion and crash) via an invalid regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "boost regular expression memory corruption flaws",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of boost as shipped with Red Hat Enterprise Linux 4 and 6. This issue was addressed in boost packages in Red Hat Enterprise Linux 5 via RHSA-2012:0305.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:boost-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-0:1.33.1-15.el5.src",
"5Client-Workstation:boost-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64",
"5Client:boost-0:1.33.1-15.el5.i386",
"5Client:boost-0:1.33.1-15.el5.ia64",
"5Client:boost-0:1.33.1-15.el5.ppc",
"5Client:boost-0:1.33.1-15.el5.ppc64",
"5Client:boost-0:1.33.1-15.el5.s390",
"5Client:boost-0:1.33.1-15.el5.s390x",
"5Client:boost-0:1.33.1-15.el5.src",
"5Client:boost-0:1.33.1-15.el5.x86_64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client:boost-devel-0:1.33.1-15.el5.i386",
"5Client:boost-devel-0:1.33.1-15.el5.ia64",
"5Client:boost-devel-0:1.33.1-15.el5.ppc",
"5Client:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client:boost-devel-0:1.33.1-15.el5.s390",
"5Client:boost-devel-0:1.33.1-15.el5.s390x",
"5Client:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client:boost-doc-0:1.33.1-15.el5.i386",
"5Client:boost-doc-0:1.33.1-15.el5.ia64",
"5Client:boost-doc-0:1.33.1-15.el5.ppc",
"5Client:boost-doc-0:1.33.1-15.el5.s390x",
"5Client:boost-doc-0:1.33.1-15.el5.x86_64",
"5Server:boost-0:1.33.1-15.el5.i386",
"5Server:boost-0:1.33.1-15.el5.ia64",
"5Server:boost-0:1.33.1-15.el5.ppc",
"5Server:boost-0:1.33.1-15.el5.ppc64",
"5Server:boost-0:1.33.1-15.el5.s390",
"5Server:boost-0:1.33.1-15.el5.s390x",
"5Server:boost-0:1.33.1-15.el5.src",
"5Server:boost-0:1.33.1-15.el5.x86_64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Server:boost-devel-0:1.33.1-15.el5.i386",
"5Server:boost-devel-0:1.33.1-15.el5.ia64",
"5Server:boost-devel-0:1.33.1-15.el5.ppc",
"5Server:boost-devel-0:1.33.1-15.el5.ppc64",
"5Server:boost-devel-0:1.33.1-15.el5.s390",
"5Server:boost-devel-0:1.33.1-15.el5.s390x",
"5Server:boost-devel-0:1.33.1-15.el5.x86_64",
"5Server:boost-doc-0:1.33.1-15.el5.i386",
"5Server:boost-doc-0:1.33.1-15.el5.ia64",
"5Server:boost-doc-0:1.33.1-15.el5.ppc",
"5Server:boost-doc-0:1.33.1-15.el5.s390x",
"5Server:boost-doc-0:1.33.1-15.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0171"
},
{
"category": "external",
"summary": "RHBZ#428316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428316"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0171",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0171"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0171",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0171"
}
],
"release_date": "2008-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-21T02:20:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:boost-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-0:1.33.1-15.el5.src",
"5Client-Workstation:boost-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64",
"5Client:boost-0:1.33.1-15.el5.i386",
"5Client:boost-0:1.33.1-15.el5.ia64",
"5Client:boost-0:1.33.1-15.el5.ppc",
"5Client:boost-0:1.33.1-15.el5.ppc64",
"5Client:boost-0:1.33.1-15.el5.s390",
"5Client:boost-0:1.33.1-15.el5.s390x",
"5Client:boost-0:1.33.1-15.el5.src",
"5Client:boost-0:1.33.1-15.el5.x86_64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client:boost-devel-0:1.33.1-15.el5.i386",
"5Client:boost-devel-0:1.33.1-15.el5.ia64",
"5Client:boost-devel-0:1.33.1-15.el5.ppc",
"5Client:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client:boost-devel-0:1.33.1-15.el5.s390",
"5Client:boost-devel-0:1.33.1-15.el5.s390x",
"5Client:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client:boost-doc-0:1.33.1-15.el5.i386",
"5Client:boost-doc-0:1.33.1-15.el5.ia64",
"5Client:boost-doc-0:1.33.1-15.el5.ppc",
"5Client:boost-doc-0:1.33.1-15.el5.s390x",
"5Client:boost-doc-0:1.33.1-15.el5.x86_64",
"5Server:boost-0:1.33.1-15.el5.i386",
"5Server:boost-0:1.33.1-15.el5.ia64",
"5Server:boost-0:1.33.1-15.el5.ppc",
"5Server:boost-0:1.33.1-15.el5.ppc64",
"5Server:boost-0:1.33.1-15.el5.s390",
"5Server:boost-0:1.33.1-15.el5.s390x",
"5Server:boost-0:1.33.1-15.el5.src",
"5Server:boost-0:1.33.1-15.el5.x86_64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Server:boost-devel-0:1.33.1-15.el5.i386",
"5Server:boost-devel-0:1.33.1-15.el5.ia64",
"5Server:boost-devel-0:1.33.1-15.el5.ppc",
"5Server:boost-devel-0:1.33.1-15.el5.ppc64",
"5Server:boost-devel-0:1.33.1-15.el5.s390",
"5Server:boost-devel-0:1.33.1-15.el5.s390x",
"5Server:boost-devel-0:1.33.1-15.el5.x86_64",
"5Server:boost-doc-0:1.33.1-15.el5.i386",
"5Server:boost-doc-0:1.33.1-15.el5.ia64",
"5Server:boost-doc-0:1.33.1-15.el5.ppc",
"5Server:boost-doc-0:1.33.1-15.el5.s390x",
"5Server:boost-doc-0:1.33.1-15.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Workstation:boost-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-0:1.33.1-15.el5.src",
"5Client-Workstation:boost-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64",
"5Client:boost-0:1.33.1-15.el5.i386",
"5Client:boost-0:1.33.1-15.el5.ia64",
"5Client:boost-0:1.33.1-15.el5.ppc",
"5Client:boost-0:1.33.1-15.el5.ppc64",
"5Client:boost-0:1.33.1-15.el5.s390",
"5Client:boost-0:1.33.1-15.el5.s390x",
"5Client:boost-0:1.33.1-15.el5.src",
"5Client:boost-0:1.33.1-15.el5.x86_64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client:boost-devel-0:1.33.1-15.el5.i386",
"5Client:boost-devel-0:1.33.1-15.el5.ia64",
"5Client:boost-devel-0:1.33.1-15.el5.ppc",
"5Client:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client:boost-devel-0:1.33.1-15.el5.s390",
"5Client:boost-devel-0:1.33.1-15.el5.s390x",
"5Client:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client:boost-doc-0:1.33.1-15.el5.i386",
"5Client:boost-doc-0:1.33.1-15.el5.ia64",
"5Client:boost-doc-0:1.33.1-15.el5.ppc",
"5Client:boost-doc-0:1.33.1-15.el5.s390x",
"5Client:boost-doc-0:1.33.1-15.el5.x86_64",
"5Server:boost-0:1.33.1-15.el5.i386",
"5Server:boost-0:1.33.1-15.el5.ia64",
"5Server:boost-0:1.33.1-15.el5.ppc",
"5Server:boost-0:1.33.1-15.el5.ppc64",
"5Server:boost-0:1.33.1-15.el5.s390",
"5Server:boost-0:1.33.1-15.el5.s390x",
"5Server:boost-0:1.33.1-15.el5.src",
"5Server:boost-0:1.33.1-15.el5.x86_64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Server:boost-devel-0:1.33.1-15.el5.i386",
"5Server:boost-devel-0:1.33.1-15.el5.ia64",
"5Server:boost-devel-0:1.33.1-15.el5.ppc",
"5Server:boost-devel-0:1.33.1-15.el5.ppc64",
"5Server:boost-devel-0:1.33.1-15.el5.s390",
"5Server:boost-devel-0:1.33.1-15.el5.s390x",
"5Server:boost-devel-0:1.33.1-15.el5.x86_64",
"5Server:boost-doc-0:1.33.1-15.el5.i386",
"5Server:boost-doc-0:1.33.1-15.el5.ia64",
"5Server:boost-doc-0:1.33.1-15.el5.ppc",
"5Server:boost-doc-0:1.33.1-15.el5.s390x",
"5Server:boost-doc-0:1.33.1-15.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "boost regular expression memory corruption flaws"
},
{
"acknowledgments": [
{
"names": [
"Will Drewry"
]
}
],
"cve": "CVE-2008-0172",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2008-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "428320"
}
],
"notes": [
{
"category": "description",
"text": "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "boost regular expression NULL dereference flaw",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of boost as shipped with Red Hat Enterprise Linux 4 and 6. This issue was addressed in boost packages in Red Hat Enterprise Linux 5 via RHSA-2012:0305.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:boost-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-0:1.33.1-15.el5.src",
"5Client-Workstation:boost-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64",
"5Client:boost-0:1.33.1-15.el5.i386",
"5Client:boost-0:1.33.1-15.el5.ia64",
"5Client:boost-0:1.33.1-15.el5.ppc",
"5Client:boost-0:1.33.1-15.el5.ppc64",
"5Client:boost-0:1.33.1-15.el5.s390",
"5Client:boost-0:1.33.1-15.el5.s390x",
"5Client:boost-0:1.33.1-15.el5.src",
"5Client:boost-0:1.33.1-15.el5.x86_64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client:boost-devel-0:1.33.1-15.el5.i386",
"5Client:boost-devel-0:1.33.1-15.el5.ia64",
"5Client:boost-devel-0:1.33.1-15.el5.ppc",
"5Client:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client:boost-devel-0:1.33.1-15.el5.s390",
"5Client:boost-devel-0:1.33.1-15.el5.s390x",
"5Client:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client:boost-doc-0:1.33.1-15.el5.i386",
"5Client:boost-doc-0:1.33.1-15.el5.ia64",
"5Client:boost-doc-0:1.33.1-15.el5.ppc",
"5Client:boost-doc-0:1.33.1-15.el5.s390x",
"5Client:boost-doc-0:1.33.1-15.el5.x86_64",
"5Server:boost-0:1.33.1-15.el5.i386",
"5Server:boost-0:1.33.1-15.el5.ia64",
"5Server:boost-0:1.33.1-15.el5.ppc",
"5Server:boost-0:1.33.1-15.el5.ppc64",
"5Server:boost-0:1.33.1-15.el5.s390",
"5Server:boost-0:1.33.1-15.el5.s390x",
"5Server:boost-0:1.33.1-15.el5.src",
"5Server:boost-0:1.33.1-15.el5.x86_64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Server:boost-devel-0:1.33.1-15.el5.i386",
"5Server:boost-devel-0:1.33.1-15.el5.ia64",
"5Server:boost-devel-0:1.33.1-15.el5.ppc",
"5Server:boost-devel-0:1.33.1-15.el5.ppc64",
"5Server:boost-devel-0:1.33.1-15.el5.s390",
"5Server:boost-devel-0:1.33.1-15.el5.s390x",
"5Server:boost-devel-0:1.33.1-15.el5.x86_64",
"5Server:boost-doc-0:1.33.1-15.el5.i386",
"5Server:boost-doc-0:1.33.1-15.el5.ia64",
"5Server:boost-doc-0:1.33.1-15.el5.ppc",
"5Server:boost-doc-0:1.33.1-15.el5.s390x",
"5Server:boost-doc-0:1.33.1-15.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0172"
},
{
"category": "external",
"summary": "RHBZ#428320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428320"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0172"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0172",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0172"
}
],
"release_date": "2008-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-21T02:20:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:boost-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-0:1.33.1-15.el5.src",
"5Client-Workstation:boost-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64",
"5Client:boost-0:1.33.1-15.el5.i386",
"5Client:boost-0:1.33.1-15.el5.ia64",
"5Client:boost-0:1.33.1-15.el5.ppc",
"5Client:boost-0:1.33.1-15.el5.ppc64",
"5Client:boost-0:1.33.1-15.el5.s390",
"5Client:boost-0:1.33.1-15.el5.s390x",
"5Client:boost-0:1.33.1-15.el5.src",
"5Client:boost-0:1.33.1-15.el5.x86_64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client:boost-devel-0:1.33.1-15.el5.i386",
"5Client:boost-devel-0:1.33.1-15.el5.ia64",
"5Client:boost-devel-0:1.33.1-15.el5.ppc",
"5Client:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client:boost-devel-0:1.33.1-15.el5.s390",
"5Client:boost-devel-0:1.33.1-15.el5.s390x",
"5Client:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client:boost-doc-0:1.33.1-15.el5.i386",
"5Client:boost-doc-0:1.33.1-15.el5.ia64",
"5Client:boost-doc-0:1.33.1-15.el5.ppc",
"5Client:boost-doc-0:1.33.1-15.el5.s390x",
"5Client:boost-doc-0:1.33.1-15.el5.x86_64",
"5Server:boost-0:1.33.1-15.el5.i386",
"5Server:boost-0:1.33.1-15.el5.ia64",
"5Server:boost-0:1.33.1-15.el5.ppc",
"5Server:boost-0:1.33.1-15.el5.ppc64",
"5Server:boost-0:1.33.1-15.el5.s390",
"5Server:boost-0:1.33.1-15.el5.s390x",
"5Server:boost-0:1.33.1-15.el5.src",
"5Server:boost-0:1.33.1-15.el5.x86_64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Server:boost-devel-0:1.33.1-15.el5.i386",
"5Server:boost-devel-0:1.33.1-15.el5.ia64",
"5Server:boost-devel-0:1.33.1-15.el5.ppc",
"5Server:boost-devel-0:1.33.1-15.el5.ppc64",
"5Server:boost-devel-0:1.33.1-15.el5.s390",
"5Server:boost-devel-0:1.33.1-15.el5.s390x",
"5Server:boost-devel-0:1.33.1-15.el5.x86_64",
"5Server:boost-doc-0:1.33.1-15.el5.i386",
"5Server:boost-doc-0:1.33.1-15.el5.ia64",
"5Server:boost-doc-0:1.33.1-15.el5.ppc",
"5Server:boost-doc-0:1.33.1-15.el5.s390x",
"5Server:boost-doc-0:1.33.1-15.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Workstation:boost-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-0:1.33.1-15.el5.src",
"5Client-Workstation:boost-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.i386",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ia64",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.ppc",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.s390x",
"5Client-Workstation:boost-doc-0:1.33.1-15.el5.x86_64",
"5Client:boost-0:1.33.1-15.el5.i386",
"5Client:boost-0:1.33.1-15.el5.ia64",
"5Client:boost-0:1.33.1-15.el5.ppc",
"5Client:boost-0:1.33.1-15.el5.ppc64",
"5Client:boost-0:1.33.1-15.el5.s390",
"5Client:boost-0:1.33.1-15.el5.s390x",
"5Client:boost-0:1.33.1-15.el5.src",
"5Client:boost-0:1.33.1-15.el5.x86_64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Client:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Client:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Client:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Client:boost-devel-0:1.33.1-15.el5.i386",
"5Client:boost-devel-0:1.33.1-15.el5.ia64",
"5Client:boost-devel-0:1.33.1-15.el5.ppc",
"5Client:boost-devel-0:1.33.1-15.el5.ppc64",
"5Client:boost-devel-0:1.33.1-15.el5.s390",
"5Client:boost-devel-0:1.33.1-15.el5.s390x",
"5Client:boost-devel-0:1.33.1-15.el5.x86_64",
"5Client:boost-doc-0:1.33.1-15.el5.i386",
"5Client:boost-doc-0:1.33.1-15.el5.ia64",
"5Client:boost-doc-0:1.33.1-15.el5.ppc",
"5Client:boost-doc-0:1.33.1-15.el5.s390x",
"5Client:boost-doc-0:1.33.1-15.el5.x86_64",
"5Server:boost-0:1.33.1-15.el5.i386",
"5Server:boost-0:1.33.1-15.el5.ia64",
"5Server:boost-0:1.33.1-15.el5.ppc",
"5Server:boost-0:1.33.1-15.el5.ppc64",
"5Server:boost-0:1.33.1-15.el5.s390",
"5Server:boost-0:1.33.1-15.el5.s390x",
"5Server:boost-0:1.33.1-15.el5.src",
"5Server:boost-0:1.33.1-15.el5.x86_64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.i386",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ia64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc",
"5Server:boost-debuginfo-0:1.33.1-15.el5.ppc64",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390",
"5Server:boost-debuginfo-0:1.33.1-15.el5.s390x",
"5Server:boost-debuginfo-0:1.33.1-15.el5.x86_64",
"5Server:boost-devel-0:1.33.1-15.el5.i386",
"5Server:boost-devel-0:1.33.1-15.el5.ia64",
"5Server:boost-devel-0:1.33.1-15.el5.ppc",
"5Server:boost-devel-0:1.33.1-15.el5.ppc64",
"5Server:boost-devel-0:1.33.1-15.el5.s390",
"5Server:boost-devel-0:1.33.1-15.el5.s390x",
"5Server:boost-devel-0:1.33.1-15.el5.x86_64",
"5Server:boost-doc-0:1.33.1-15.el5.i386",
"5Server:boost-doc-0:1.33.1-15.el5.ia64",
"5Server:boost-doc-0:1.33.1-15.el5.ppc",
"5Server:boost-doc-0:1.33.1-15.el5.s390x",
"5Server:boost-doc-0:1.33.1-15.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "boost regular expression NULL dereference flaw"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.