Synopsis
Moderate: boost security update
Type/Severity
Security Advisory: Moderate
Topic
Updated boost packages that fix one security issue are now available for
Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Description
The boost packages provide free, peer-reviewed, portable C++ source
libraries with emphasis on libraries which work well with the C++ Standard
Library.
A flaw was found in the way the ordered_malloc() routine in Boost sanitized
the 'next_size' and 'max_size' parameters when allocating memory. If an
application used the Boost C++ libraries for memory allocation, and
performed memory allocation based on user-supplied input, an attacker could
use this flaw to crash the application or, potentially, execute arbitrary
code with the privileges of the user running the application.
(CVE-2012-2677)
All users of boost are advised to upgrade to these updated packages, which
contain a backported patch to fix this issue.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
-
Red Hat Enterprise Linux Server 6 x86_64
-
Red Hat Enterprise Linux Server 6 i386
-
Red Hat Enterprise Linux Server 5 x86_64
-
Red Hat Enterprise Linux Server 5 ia64
-
Red Hat Enterprise Linux Server 5 i386
-
Red Hat Enterprise Linux Server - Extended Update Support 6.4 x86_64
-
Red Hat Enterprise Linux Server - Extended Update Support 6.4 i386
-
Red Hat Enterprise Linux Server - Extended Update Support 5.9 x86_64
-
Red Hat Enterprise Linux Server - Extended Update Support 5.9 ia64
-
Red Hat Enterprise Linux Server - Extended Update Support 5.9 i386
-
Red Hat Enterprise Linux Server - AUS 5.9 ia64
-
Red Hat Enterprise Linux Server - AUS 5.9 i386
-
Red Hat Enterprise Linux Workstation 6 x86_64
-
Red Hat Enterprise Linux Workstation 6 i386
-
Red Hat Enterprise Linux Workstation 5 x86_64
-
Red Hat Enterprise Linux Workstation 5 i386
-
Red Hat Enterprise Linux Desktop 6 x86_64
-
Red Hat Enterprise Linux Desktop 5 x86_64
-
Red Hat Enterprise Linux Desktop 5 i386
-
Red Hat Enterprise Linux for IBM z Systems 6 s390x
-
Red Hat Enterprise Linux for IBM z Systems 5 s390x
-
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.4 s390x
-
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9 s390x
-
Red Hat Enterprise Linux for Power, big endian 6 ppc64
-
Red Hat Enterprise Linux for Power, big endian 5 ppc
-
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.4 ppc64
-
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9 ppc
-
Red Hat Enterprise Linux for Scientific Computing 6 x86_64
-
Red Hat Enterprise Linux Server from RHUI 6 x86_64
-
Red Hat Enterprise Linux Server from RHUI 6 i386
-
Red Hat Enterprise Linux Server from RHUI 5 x86_64
-
Red Hat Enterprise Linux Server from RHUI 5 i386
-
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4 x86_64
-
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4 i386
-
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 x86_64
-
Red Hat Gluster Storage Server for On-premise 2.1 x86_64
-
Red Hat Storage for Public Cloud (via RHUI) 2.1 x86_64
-
Red Hat Enterprise Linux Server - AUS 6.4 x86_64
-
Red Hat Enterprise Linux Server - AUS 5.9 x86_64
-
Red Hat Enterprise Linux Desktop 6 i386
-
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 i386
Fixes
- BZ - 828856 - CVE-2012-2677 boost: ordered_malloc() overflow
CVEs
References