[Trisquel-security] [USN-1727-1] Boost vulnerability
Marc Deslauriers
marc.deslauriers at canonical.com
Mon Feb 18 14:44:44 CET 2013
==========================================================================
Ubuntu Security Notice USN-1727-1
February 18, 2013
boost1.49 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
Summary:
Boost incorrectly validated certain UTF-8 sequences.
Software Description:
- boost1.49: C++ representation of time duration, time point, and clocks
Details:
It was discovered that the Boost.Locale library incorrectly validated some
invalid UTF-8 sequences. An attacker could possibly use this issue to
bypass input validation in certain applications.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
libboost-locale1.49.0 1.49.0-3.1ubuntu1.2
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1727-1
CVE-2013-0252
Package Information:
https://launchpad.net/ubuntu/+source/boost1.49/1.49.0-3.1ubuntu1.2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 899 bytes
Desc: OpenPGP digital signature
URL: <http://listas.trisquel.info/pipermail/trisquel-security/attachments/20130218/de5771fc/attachment.pgp>
-------------- next part --------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce at lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
More information about the Trisquel-security
mailing list