[Trisquel-security] [USN-1727-1] Boost vulnerability

Marc Deslauriers marc.deslauriers at canonical.com
Mon Feb 18 14:44:44 CET 2013


==========================================================================
Ubuntu Security Notice USN-1727-1
February 18, 2013

boost1.49 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10

Summary:

Boost incorrectly validated certain UTF-8 sequences.

Software Description:
- boost1.49: C++ representation of time duration, time point, and clocks

Details:

It was discovered that the Boost.Locale library incorrectly validated some
invalid UTF-8 sequences. An attacker could possibly use this issue to
bypass input validation in certain applications.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
  libboost-locale1.49.0           1.49.0-3.1ubuntu1.2

In general, a standard system update will make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-1727-1
  CVE-2013-0252

Package Information:
  https://launchpad.net/ubuntu/+source/boost1.49/1.49.0-3.1ubuntu1.2


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 899 bytes
Desc: OpenPGP digital signature
URL: <http://listas.trisquel.info/pipermail/trisquel-security/attachments/20130218/de5771fc/attachment.pgp>
-------------- next part --------------
-- 
ubuntu-security-announce mailing list
ubuntu-security-announce at lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


More information about the Trisquel-security mailing list