boost

Page content
  • Author: vmiklos
  • Vulnerable: 1.34.0-5
  • Unaffected: 1.34.0-6sayshell1

Some vulnerabilities have been reported in Boost, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerabilities are caused due to errors within the parsing of regular expressions in boost/regex/v4/basic_regex_parser.hpp. These can be exploited to crash an application linked against the Boost library via specially crafted regular expressions.

CVEs: