A security flaw was found in the way UTF-8 decoder of boost, set of free peer-reviewed portable C++ source libraries, performed validation of certain UTF-8 encoded sequences. If an application, linked against boost used the UTF-8 decoding routines for input validation (and depended at the results), an attacker could use this flaw to confuse the validator into (errorneously) accepting them as valid. Upstream bug report: [1] https://svn.boost.org/trac/boost/ticket/7743 Upstream advisory: [2] http://www.boost.org/users/news/boost_locale_security_notice.html Relevant upstream patch: [3] http://cppcms.com/files/locale/boost_locale_utf.patch References: [4] http://www.openwall.com/lists/oss-security/2013/02/04/1 [5] http://www.openwall.com/lists/oss-security/2013/02/04/2
This issue did NOT affect the versions of the boost package, as shipped with Red Hat Enterprise Linux 5 and 6. -- This issue did NOT affect the version of the boost package, as shipped with Fedora release of 16. -- This issue affects the versions of the boost package, as shipped with Fedora release of 17 and 18. Please schedule an update. -- This issue did NOT affect the versions of the boost141 package, as shipped with Fedora release of 17 and Fedora EPEL 5.
Created boost tracking bugs for this issue Affects: fedora-all [bug 907482]
Statement: Not vulnerable. This issue did not affect the versions of boost as shipped with Red Hat Enterprise Linux 5 and 6.
boost-1.48.0-14.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
boost-1.50.0-5.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.