boost
Page content
- Author: vmiklos
- Vulnerable: 1.34.0-5
- Unaffected: 1.34.0-6sayshell1
Some vulnerabilities have been reported in Boost, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerabilities are caused due to errors within the parsing of regular expressions in boost/regex/v4/basic_regex_parser.hpp. These can be exploited to crash an application linked against the Boost library via specially crafted regular expressions.
- Bug Tracker URL: http://bugs.frugalware.org/task/2720