CVE-2008-0172

Publication date 17 January 2008

Last updated 24 July 2024


Ubuntu priority

The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.

Read the notes from the security team

Status

Package Ubuntu Release Status
boost 7.10 gutsy
Fixed 1.34.1-2ubuntu1.1
7.04 feisty
Fixed 1.33.1-9ubuntu3.1
6.10 edgy
Fixed 1.33.1-7ubuntu1.1
6.06 LTS dapper
Fixed 1.33.1-2ubuntu0.1

Notes


jdstrand

reproducers on vsec

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
boost

References

Related Ubuntu Security Notices (USN)

    • USN-570-1
    • boost vulnerabilities
    • 16 January 2008

Other references