Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:0305 - Security Advisory
Issued:
2012-02-21
Updated:
2012-02-21

RHSA-2012:0305 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: boost security and bug fix update

Type/Severity

Security Advisory: Low

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated boost packages that fix two security issues and two bugs are now
available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The boost packages provide free, peer-reviewed, portable C++ source
libraries with emphasis on libraries which work well with the C++ Standard
Library.

Invalid pointer dereference flaws were found in the way the Boost regular
expression library processed certain, invalid expressions. An attacker able
to make an application using the Boost library process a specially-crafted
regular expression could cause that application to crash or, potentially,
execute arbitrary code with the privileges of the user running the
application. (CVE-2008-0171)

NULL pointer dereference flaws were found in the way the Boost regular
expression library processed certain, invalid expressions. An attacker able
to make an application using the Boost library process a specially-crafted
regular expression could cause that application to crash. (CVE-2008-0172)

Red Hat would like to thank Will Drewry for reporting these issues.

This update also fixes the following bugs:

  • Prior to this update, the construction of a regular expression object

could fail when several regular expression objects were created
simultaneously, such as in a multi-threaded program. With this update, the
object variables have been moved from the shared memory to the stack. Now,
the constructing function is thread safe. (BZ#472384)

  • Prior to this update, header files in several Boost libraries contained

preprocessor directives that the GNU Compiler Collection (GCC) 4.4 could
not handle. This update instead uses equivalent constructs that are
standard C. (BZ#567722)

All users of boost are advised to upgrade to these updated packages, which
fix these issues.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 428316 - CVE-2008-0171 boost regular expression memory corruption flaws
  • BZ - 428320 - CVE-2008-0172 boost regular expression NULL dereference flaw
  • BZ - 472384 - Thread-safety bug in Boost.Regex-1.33.x
  • BZ - 567722 - g++4.4 incompatible with numeric/ublas/matrix_sparse.hpp

CVEs

  • CVE-2008-0171
  • CVE-2008-0172

References

  • https://access.redhat.com/security/updates/classification/#low
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
boost-1.33.1-15.el5.src.rpm SHA-256: 2f70527606dd116ad538948d6da6b3cdb5a83b4f1dd2d6341a7f6586aee4cb92
x86_64
boost-1.33.1-15.el5.i386.rpm SHA-256: 0a7b5cb796e962078ec6af70e3252e9edbc488da65cce0fdc5c62f96b171f6d3
boost-1.33.1-15.el5.x86_64.rpm SHA-256: 4a2a3fcf3f80c4c234d70065572dc237fdf54a7e3da2544c0ea18f6973146ad4
boost-debuginfo-1.33.1-15.el5.i386.rpm SHA-256: d9e0dfe178f432f9f6a19c31265b7ad2681490848c8f0c9e582c3c70ac2686d4
boost-debuginfo-1.33.1-15.el5.x86_64.rpm SHA-256: 4145e0d36fb91f46520aa07e6f4032d1c774b42d179866ac269e195156e35336
boost-devel-1.33.1-15.el5.i386.rpm SHA-256: dcad10ee45908b36a9ec4e5b298b72967623dd9a943668c8e46c7a742a672bcb
boost-devel-1.33.1-15.el5.x86_64.rpm SHA-256: e599d4bfd51a449dab87047090b598febd4b8b35e83e4db8c1c30b3901d5abfe
boost-doc-1.33.1-15.el5.x86_64.rpm SHA-256: 37cdb81d3551d96ef11e02a678a130dac7301f0945c36a4bfe789e0c897f48c8
ia64
boost-1.33.1-15.el5.ia64.rpm SHA-256: 0d26c4e6272ed12c236099acc52dfe2425ed2910078a57c1631912097b462609
boost-debuginfo-1.33.1-15.el5.ia64.rpm SHA-256: 9f660b7ff6bfddd1ff2afe713ef26ee8277741228d1a77b6cc02df75122e5de1
boost-devel-1.33.1-15.el5.ia64.rpm SHA-256: 4eef08c8fcfba0ff3b458df7eba8cfcdfdd2d3106570675fe786b49c662971a7
boost-doc-1.33.1-15.el5.ia64.rpm SHA-256: 10038fe0c3f63f468370ba9625bca92b51e3a96aec60cdf6e972ecc197a11818
i386
boost-1.33.1-15.el5.i386.rpm SHA-256: 0a7b5cb796e962078ec6af70e3252e9edbc488da65cce0fdc5c62f96b171f6d3
boost-debuginfo-1.33.1-15.el5.i386.rpm SHA-256: d9e0dfe178f432f9f6a19c31265b7ad2681490848c8f0c9e582c3c70ac2686d4
boost-devel-1.33.1-15.el5.i386.rpm SHA-256: dcad10ee45908b36a9ec4e5b298b72967623dd9a943668c8e46c7a742a672bcb
boost-doc-1.33.1-15.el5.i386.rpm SHA-256: 4ba264175ec3c44fd6782c1504326edf04df55688b9e0236736e95eef3319491

Red Hat Enterprise Linux Workstation 5

SRPM
boost-1.33.1-15.el5.src.rpm SHA-256: 2f70527606dd116ad538948d6da6b3cdb5a83b4f1dd2d6341a7f6586aee4cb92
x86_64
boost-1.33.1-15.el5.i386.rpm SHA-256: 0a7b5cb796e962078ec6af70e3252e9edbc488da65cce0fdc5c62f96b171f6d3
boost-1.33.1-15.el5.x86_64.rpm SHA-256: 4a2a3fcf3f80c4c234d70065572dc237fdf54a7e3da2544c0ea18f6973146ad4
boost-debuginfo-1.33.1-15.el5.i386.rpm SHA-256: d9e0dfe178f432f9f6a19c31265b7ad2681490848c8f0c9e582c3c70ac2686d4
boost-debuginfo-1.33.1-15.el5.i386.rpm SHA-256: d9e0dfe178f432f9f6a19c31265b7ad2681490848c8f0c9e582c3c70ac2686d4
boost-debuginfo-1.33.1-15.el5.x86_64.rpm SHA-256: 4145e0d36fb91f46520aa07e6f4032d1c774b42d179866ac269e195156e35336
boost-debuginfo-1.33.1-15.el5.x86_64.rpm SHA-256: 4145e0d36fb91f46520aa07e6f4032d1c774b42d179866ac269e195156e35336
boost-devel-1.33.1-15.el5.i386.rpm SHA-256: dcad10ee45908b36a9ec4e5b298b72967623dd9a943668c8e46c7a742a672bcb
boost-devel-1.33.1-15.el5.x86_64.rpm SHA-256: e599d4bfd51a449dab87047090b598febd4b8b35e83e4db8c1c30b3901d5abfe
boost-doc-1.33.1-15.el5.x86_64.rpm SHA-256: 37cdb81d3551d96ef11e02a678a130dac7301f0945c36a4bfe789e0c897f48c8
i386
boost-1.33.1-15.el5.i386.rpm SHA-256: 0a7b5cb796e962078ec6af70e3252e9edbc488da65cce0fdc5c62f96b171f6d3
boost-debuginfo-1.33.1-15.el5.i386.rpm SHA-256: d9e0dfe178f432f9f6a19c31265b7ad2681490848c8f0c9e582c3c70ac2686d4
boost-debuginfo-1.33.1-15.el5.i386.rpm SHA-256: d9e0dfe178f432f9f6a19c31265b7ad2681490848c8f0c9e582c3c70ac2686d4
boost-devel-1.33.1-15.el5.i386.rpm SHA-256: dcad10ee45908b36a9ec4e5b298b72967623dd9a943668c8e46c7a742a672bcb
boost-doc-1.33.1-15.el5.i386.rpm SHA-256: 4ba264175ec3c44fd6782c1504326edf04df55688b9e0236736e95eef3319491

Red Hat Enterprise Linux Desktop 5

SRPM
boost-1.33.1-15.el5.src.rpm SHA-256: 2f70527606dd116ad538948d6da6b3cdb5a83b4f1dd2d6341a7f6586aee4cb92
x86_64
boost-1.33.1-15.el5.i386.rpm SHA-256: 0a7b5cb796e962078ec6af70e3252e9edbc488da65cce0fdc5c62f96b171f6d3
boost-1.33.1-15.el5.x86_64.rpm SHA-256: 4a2a3fcf3f80c4c234d70065572dc237fdf54a7e3da2544c0ea18f6973146ad4
boost-debuginfo-1.33.1-15.el5.i386.rpm SHA-256: d9e0dfe178f432f9f6a19c31265b7ad2681490848c8f0c9e582c3c70ac2686d4
boost-debuginfo-1.33.1-15.el5.x86_64.rpm SHA-256: 4145e0d36fb91f46520aa07e6f4032d1c774b42d179866ac269e195156e35336
boost-doc-1.33.1-15.el5.x86_64.rpm SHA-256: 37cdb81d3551d96ef11e02a678a130dac7301f0945c36a4bfe789e0c897f48c8
i386
boost-1.33.1-15.el5.i386.rpm SHA-256: 0a7b5cb796e962078ec6af70e3252e9edbc488da65cce0fdc5c62f96b171f6d3
boost-debuginfo-1.33.1-15.el5.i386.rpm SHA-256: d9e0dfe178f432f9f6a19c31265b7ad2681490848c8f0c9e582c3c70ac2686d4
boost-doc-1.33.1-15.el5.i386.rpm SHA-256: 4ba264175ec3c44fd6782c1504326edf04df55688b9e0236736e95eef3319491

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
boost-1.33.1-15.el5.src.rpm SHA-256: 2f70527606dd116ad538948d6da6b3cdb5a83b4f1dd2d6341a7f6586aee4cb92
s390x
boost-1.33.1-15.el5.s390.rpm SHA-256: 7c4e6b29859e34cf015bd61969addf40877a32d4dc1e43e8650a96a4ac52f776
boost-1.33.1-15.el5.s390x.rpm SHA-256: 27e08e1f7540af2630488c75c6b532fd3a60706a8a5b853c27152c2e980ba2a5
boost-debuginfo-1.33.1-15.el5.s390.rpm SHA-256: 46df889964d8c627c6a1c9d715132b9a390359fe4c364426ba3a4d4ea54b9559
boost-debuginfo-1.33.1-15.el5.s390x.rpm SHA-256: 15adf632b34970b4865077f2f22bab622f41db539e529f851a32714ffe9cb71b
boost-devel-1.33.1-15.el5.s390.rpm SHA-256: 1cd7bd8c6e6c8ad42b6e17e9e32635790ececbf4f9d11c5c61e0f3cfeeabbcac
boost-devel-1.33.1-15.el5.s390x.rpm SHA-256: 79da9e17e6e98447fa0d44f330534342b83bf22aba23589aefd10ff9f0327044
boost-doc-1.33.1-15.el5.s390x.rpm SHA-256: a923ad91895597158bc20d32c58a50ca7e865f7eeb1c7ee97cda81d9b0551f14

Red Hat Enterprise Linux for Power, big endian 5

SRPM
boost-1.33.1-15.el5.src.rpm SHA-256: 2f70527606dd116ad538948d6da6b3cdb5a83b4f1dd2d6341a7f6586aee4cb92
ppc
boost-1.33.1-15.el5.ppc.rpm SHA-256: 23acaacee21d46c02d04a7a4278a3a69aea574e7071484b3acd371669188e155
boost-1.33.1-15.el5.ppc64.rpm SHA-256: a9208837c298db4ecf316ed0267dfe95173a498a033d1aefc57b2e6729628a95
boost-debuginfo-1.33.1-15.el5.ppc.rpm SHA-256: d2c7519120a32d8839ef78ead5f80ed107cad27a7f813560ff8c28d576f4b6df
boost-debuginfo-1.33.1-15.el5.ppc64.rpm SHA-256: ed4b71caac4fd062fa5def7925ce19903ed00cf40dd9135516fbcd688c621293
boost-devel-1.33.1-15.el5.ppc.rpm SHA-256: fb028a80d15d68468340b583fa3aab0f86c21f520eb4cc57ef06524123c6a61c
boost-devel-1.33.1-15.el5.ppc64.rpm SHA-256: d6f01ab547258309d9b400f38abac7d26270befe408a9ac6f1abeb3e2f87d125
boost-doc-1.33.1-15.el5.ppc.rpm SHA-256: 32a90420a322b94827b805e4421f02bf7dcc0f4a61fbea5ab7b1987f064717c0

Red Hat Enterprise Linux Server from RHUI 5

SRPM
boost-1.33.1-15.el5.src.rpm SHA-256: 2f70527606dd116ad538948d6da6b3cdb5a83b4f1dd2d6341a7f6586aee4cb92
x86_64
boost-1.33.1-15.el5.i386.rpm SHA-256: 0a7b5cb796e962078ec6af70e3252e9edbc488da65cce0fdc5c62f96b171f6d3
boost-1.33.1-15.el5.x86_64.rpm SHA-256: 4a2a3fcf3f80c4c234d70065572dc237fdf54a7e3da2544c0ea18f6973146ad4
boost-debuginfo-1.33.1-15.el5.i386.rpm SHA-256: d9e0dfe178f432f9f6a19c31265b7ad2681490848c8f0c9e582c3c70ac2686d4
boost-debuginfo-1.33.1-15.el5.x86_64.rpm SHA-256: 4145e0d36fb91f46520aa07e6f4032d1c774b42d179866ac269e195156e35336
boost-devel-1.33.1-15.el5.i386.rpm SHA-256: dcad10ee45908b36a9ec4e5b298b72967623dd9a943668c8e46c7a742a672bcb
boost-devel-1.33.1-15.el5.x86_64.rpm SHA-256: e599d4bfd51a449dab87047090b598febd4b8b35e83e4db8c1c30b3901d5abfe
boost-doc-1.33.1-15.el5.x86_64.rpm SHA-256: 37cdb81d3551d96ef11e02a678a130dac7301f0945c36a4bfe789e0c897f48c8
i386
boost-1.33.1-15.el5.i386.rpm SHA-256: 0a7b5cb796e962078ec6af70e3252e9edbc488da65cce0fdc5c62f96b171f6d3
boost-debuginfo-1.33.1-15.el5.i386.rpm SHA-256: d9e0dfe178f432f9f6a19c31265b7ad2681490848c8f0c9e582c3c70ac2686d4
boost-devel-1.33.1-15.el5.i386.rpm SHA-256: dcad10ee45908b36a9ec4e5b298b72967623dd9a943668c8e46c7a742a672bcb
boost-doc-1.33.1-15.el5.i386.rpm SHA-256: 4ba264175ec3c44fd6782c1504326edf04df55688b9e0236736e95eef3319491

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility