ID OPENVAS:1361412562310870563 Type openvas Reporter Copyright (c) 2012 Greenbone Networks GmbH Modified 2018-11-23T00:00:00
Description
The remote host is missing an update for the
###############################################################################
# OpenVAS Vulnerability Test
#
# RedHat Update for boost RHSA-2012:0305-03
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_xref(name:"URL", value:"https://www.redhat.com/archives/rhsa-announce/2012-February/msg00054.html");
script_oid("1.3.6.1.4.1.25623.1.0.870563");
script_version("$Revision: 12497 $");
script_tag(name:"last_modification", value:"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $");
script_tag(name:"creation_date", value:"2012-02-21 18:57:09 +0530 (Tue, 21 Feb 2012)");
script_cve_id("CVE-2008-0171", "CVE-2008-0172");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_xref(name:"RHSA", value:"2012:0305-03");
script_name("RedHat Update for boost RHSA-2012:0305-03");
script_tag(name:"summary", value:"The remote host is missing an update for the 'boost'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2012 Greenbone Networks GmbH");
script_family("Red Hat Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms", re:"ssh/login/release=RHENT_5");
script_tag(name:"affected", value:"boost on Red Hat Enterprise Linux (v. 5 server)");
script_tag(name:"solution", value:"Please Install the Updated Packages.");
script_tag(name:"insight", value:"The boost packages provide free, peer-reviewed, portable C++ source
libraries with emphasis on libraries which work well with the C++ Standard
Library.
Invalid pointer dereference flaws were found in the way the Boost regular
expression library processed certain, invalid expressions. An attacker able
to make an application using the Boost library process a specially-crafted
regular expression could cause that application to crash or, potentially,
execute arbitrary code with the privileges of the user running the
application. (CVE-2008-0171)
NULL pointer dereference flaws were found in the way the Boost regular
expression library processed certain, invalid expressions. An attacker able
to make an application using the Boost library process a specially-crafted
regular expression could cause that application to crash. (CVE-2008-0172)
Red Hat would like to thank Will Drewry for reporting these issues.
This update also fixes the following bugs:
* Prior to this update, the construction of a regular expression object
could fail when several regular expression objects were created
simultaneously, such as in a multi-threaded program. With this update, the
object variables have been moved from the shared memory to the stack. Now,
the constructing function is thread safe. (BZ#472384)
* Prior to this update, header files in several Boost libraries contained
preprocessor directives that the GNU Compiler Collection (GCC) 4.4 could
not handle. This update instead uses equivalent constructs that are
standard C. (BZ#567722)
All users of boost are advised to upgrade to these updated packages, which
fix these issues.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release) exit(0);
res = "";
if(release == "RHENT_5")
{
if ((res = isrpmvuln(pkg:"boost", rpm:"boost~1.33.1~15.el5", rls:"RHENT_5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"boost-debuginfo", rpm:"boost-debuginfo~1.33.1~15.el5", rls:"RHENT_5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"boost-devel", rpm:"boost-devel~1.33.1~15.el5", rls:"RHENT_5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"boost-doc", rpm:"boost-doc~1.33.1~15.el5", rls:"RHENT_5")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
{"id": "OPENVAS:1361412562310870563", "type": "openvas", "bulletinFamily": "scanner", "title": "RedHat Update for boost RHSA-2012:0305-03", "description": "The remote host is missing an update for the ", "published": "2012-02-21T00:00:00", "modified": "2018-11-23T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870563", "reporter": "Copyright (c) 2012 Greenbone Networks GmbH", "references": ["2012:0305-03", "https://www.redhat.com/archives/rhsa-announce/2012-February/msg00054.html"], "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "lastseen": "2019-05-29T18:38:52", "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2008-0172", "CVE-2008-0171"]}, {"type": "openvas", "idList": ["OPENVAS:860401", "OPENVAS:136141256231065973", "OPENVAS:1361412562310123961", "OPENVAS:1361412562310830567", "OPENVAS:860006", "OPENVAS:870563", "OPENVAS:60385", "OPENVAS:840297", "OPENVAS:65973", "OPENVAS:830567"]}, {"type": "gentoo", "idList": ["GLSA-200802-08"]}, {"type": "redhat", "idList": ["RHSA-2012:0305"]}, {"type": "ubuntu", "idList": ["USN-570-1"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:8582", "SECURITYVULNS:DOC:18894"]}, {"type": "fedora", "idList": ["FEDORA:M0MFVLA0032398", "FEDORA:M2D7QWWM019059"]}, {"type": "nessus", "idList": ["FEDORA_2008-0880.NASL", "MANDRIVA_MDVSA-2008-032.NASL", "UBUNTU_USN-570-1.NASL", "SL_20120221_BOOST_ON_SL5_X.NASL", "GENTOO_GLSA-200802-08.NASL", "SUSE_BOOST-4978.NASL", "FEDORA_2008-0754.NASL", "SUSE_BOOST-4946.NASL", "ORACLELINUX_ELSA-2012-0305.NASL", "REDHAT-RHSA-2012-0305.NASL"]}, {"type": "oraclelinux", "idList": ["ELSA-2012-0305"]}], "modified": "2019-05-29T18:38:52", "rev": 2}, "score": {"value": 6.7, "vector": "NONE", "modified": "2019-05-29T18:38:52", "rev": 2}, "vulnersScore": 6.7}, "pluginID": "1361412562310870563", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for boost RHSA-2012:0305-03\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2012-February/msg00054.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870563\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-21 18:57:09 +0530 (Tue, 21 Feb 2012)\");\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name:\"RHSA\", value:\"2012:0305-03\");\n script_name(\"RedHat Update for boost RHSA-2012:0305-03\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'boost'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_5\");\n script_tag(name:\"affected\", value:\"boost on Red Hat Enterprise Linux (v. 5 server)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"The boost packages provide free, peer-reviewed, portable C++ source\n libraries with emphasis on libraries which work well with the C++ Standard\n Library.\n\n Invalid pointer dereference flaws were found in the way the Boost regular\n expression library processed certain, invalid expressions. An attacker able\n to make an application using the Boost library process a specially-crafted\n regular expression could cause that application to crash or, potentially,\n execute arbitrary code with the privileges of the user running the\n application. (CVE-2008-0171)\n\n NULL pointer dereference flaws were found in the way the Boost regular\n expression library processed certain, invalid expressions. An attacker able\n to make an application using the Boost library process a specially-crafted\n regular expression could cause that application to crash. (CVE-2008-0172)\n\n Red Hat would like to thank Will Drewry for reporting these issues.\n\n This update also fixes the following bugs:\n\n * Prior to this update, the construction of a regular expression object\n could fail when several regular expression objects were created\n simultaneously, such as in a multi-threaded program. With this update, the\n object variables have been moved from the shared memory to the stack. Now,\n the constructing function is thread safe. (BZ#472384)\n\n * Prior to this update, header files in several Boost libraries contained\n preprocessor directives that the GNU Compiler Collection (GCC) 4.4 could\n not handle. This update instead uses equivalent constructs that are\n standard C. (BZ#567722)\n\n All users of boost are advised to upgrade to these updated packages, which\n fix these issues.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"boost\", rpm:\"boost~1.33.1~15.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost-debuginfo\", rpm:\"boost-debuginfo~1.33.1~15.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost-devel\", rpm:\"boost-devel~1.33.1~15.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost-doc\", rpm:\"boost-doc~1.33.1~15.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "naslFamily": "Red Hat Local Security Checks"}
{"cve": [{"lastseen": "2021-02-02T05:35:11", "description": "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.", "edition": 4, "cvss3": {}, "published": "2008-01-17T23:00:00", "title": "CVE-2008-0172", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-0172"], "modified": "2018-10-15T21:58:00", "cpe": ["cpe:/a:boost:boost:1.34", "cpe:/a:boost:boost:1.33"], "id": "CVE-2008-0172", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-0172", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:boost:boost:1.34:*:*:*:*:*:*:*", "cpe:2.3:a:boost:boost:1.33:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:35:11", "description": "regex/v4/perl_matcher_non_recursive.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (failed assertion and crash) via an invalid regular expression.", "edition": 4, "cvss3": {}, "published": "2008-01-17T23:00:00", "title": "CVE-2008-0171", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-0171"], "modified": "2018-10-15T21:58:00", "cpe": ["cpe:/a:boost:boost:1.34", "cpe:/a:boost:boost:1.33", "cpe:/a:boost:boost_regex_library:*"], "id": "CVE-2008-0171", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-0171", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:boost:boost:1.34:*:*:*:*:*:*:*", "cpe:2.3:a:boost:boost_regex_library:*:*:*:*:*:*:*:*", "cpe:2.3:a:boost:boost:1.33:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2017-07-25T10:57:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "Check for the Version of boost", "modified": "2017-07-10T00:00:00", "published": "2009-02-17T00:00:00", "id": "OPENVAS:860006", "href": "http://plugins.openvas.org/nasl.php?oid=860006", "type": "openvas", "title": "Fedora Update for boost FEDORA-2008-0880", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for boost FEDORA-2008-0880\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"boost on Fedora 7\";\ntag_insight = \"Boost provides free peer-reviewed portable C++ source libraries. The\n emphasis is on libraries which work well with the C++ Standard\n Library, in the hopes of establishing "existing practice" for\n extensions and providing reference implementations so that the Boost\n libraries are suitable for eventual standardization. (Some of the\n libraries have already been proposed for inclusion in the C++\n Standards Committee's upcoming C++ Standard Library Technical Report.)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html\");\n script_id(860006);\n script_version(\"$Revision: 6623 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:10:20 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-17 17:12:43 +0100 (Tue, 17 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"FEDORA\", value: \"2008-0880\");\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_name( \"Fedora Update for boost FEDORA-2008-0880\");\n\n script_summary(\"Check for the Version of boost\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC7\")\n{\n\n if ((res = isrpmvuln(pkg:\"boost\", rpm:\"boost~1.33.1~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost-debuginfo\", rpm:\"boost-debuginfo~1.33.1~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost-doc\", rpm:\"boost-doc~1.33.1~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost-devel-static\", rpm:\"boost-devel-static~1.33.1~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost-devel\", rpm:\"boost-devel~1.33.1~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost\", rpm:\"boost~1.33.1~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost-debuginfo\", rpm:\"boost-debuginfo~1.33.1~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost-doc\", rpm:\"boost-doc~1.33.1~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost-devel-static\", rpm:\"boost-devel-static~1.33.1~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost-devel\", rpm:\"boost-devel~1.33.1~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost\", rpm:\"boost~1.33.1~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-26T08:55:15", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n boost\n boost-devel\n boost-doc\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-10-13T00:00:00", "id": "OPENVAS:65973", "href": "http://plugins.openvas.org/nasl.php?oid=65973", "type": "openvas", "title": "SLES10: Security update for boost", "sourceData": "#\n#VID slesp1-boost-4978\n# OpenVAS Vulnerability Test\n# $\n# Description: Security update for boost\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n boost\n boost-devel\n boost-doc\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n\nif(description)\n{\n script_id(65973);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)\");\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"SLES10: Security update for boost\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"boost\", rpm:\"boost~1.33.1~17.7\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"boost-devel\", rpm:\"boost-devel~1.33.1~17.7\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"boost-doc\", rpm:\"boost-doc~1.33.1~17.7\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:56:09", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "Check for the Version of boost", "modified": "2017-07-06T00:00:00", "published": "2009-04-09T00:00:00", "id": "OPENVAS:830567", "href": "http://plugins.openvas.org/nasl.php?oid=830567", "type": "openvas", "title": "Mandriva Update for boost MDVSA-2008:032 (boost)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for boost MDVSA-2008:032 (boost)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Tavis Ormandy and Will Drewry found that the bost library did not\n properly perform input validation on regular expressions. An attacker\n could exploit this by sening a specially crafted regular expression\n to an application linked against boost and cause a denial of service\n via an application crash.\n\n The updated packages have been patched to correct this issue.\";\n\ntag_affected = \"boost on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64,\n Mandriva Linux 2007.1,\n Mandriva Linux 2007.1/X86_64,\n Mandriva Linux 2008.0,\n Mandriva Linux 2008.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2008-02/msg00002.php\");\n script_id(830567);\n script_version(\"$Revision: 6568 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:04:21 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 14:26:37 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"MDVSA\", value: \"2008:032\");\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_name( \"Mandriva Update for boost MDVSA-2008:032 (boost)\");\n\n script_summary(\"Check for the Version of boost\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"libboost1\", rpm:\"libboost1~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-devel\", rpm:\"libboost1-devel~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-examples\", rpm:\"libboost1-examples~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-static-devel\", rpm:\"libboost1-static-devel~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost\", rpm:\"boost~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1\", rpm:\"lib64boost1~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-devel\", rpm:\"lib64boost1-devel~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-examples\", rpm:\"lib64boost1-examples~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-static-devel\", rpm:\"lib64boost1-static-devel~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libboost1\", rpm:\"libboost1~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-devel\", rpm:\"libboost1-devel~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-examples\", rpm:\"libboost1-examples~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-static-devel\", rpm:\"libboost1-static-devel~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost\", rpm:\"boost~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1\", rpm:\"lib64boost1~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-devel\", rpm:\"lib64boost1-devel~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-examples\", rpm:\"lib64boost1-examples~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-static-devel\", rpm:\"lib64boost1-static-devel~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2008.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libboost1\", rpm:\"libboost1~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-devel\", rpm:\"libboost1-devel~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-examples\", rpm:\"libboost1-examples~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-static-devel\", rpm:\"libboost1-static-devel~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost\", rpm:\"boost~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1\", rpm:\"lib64boost1~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-devel\", rpm:\"lib64boost1-devel~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-examples\", rpm:\"lib64boost1-examples~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-static-devel\", rpm:\"lib64boost1-static-devel~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:37:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n boost\n boost-devel\n boost-doc\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-13T00:00:00", "id": "OPENVAS:136141256231065973", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065973", "type": "openvas", "title": "SLES10: Security update for boost", "sourceData": "#\n#VID slesp1-boost-4978\n# OpenVAS Vulnerability Test\n# $\n# Description: Security update for boost\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n boost\n boost-devel\n boost-doc\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65973\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)\");\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"SLES10: Security update for boost\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"boost\", rpm:\"boost~1.33.1~17.7\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"boost-devel\", rpm:\"boost-devel~1.33.1~17.7\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"boost-doc\", rpm:\"boost-doc~1.33.1~17.7\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-04-09T11:38:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "Check for the Version of boost", "modified": "2018-04-06T00:00:00", "published": "2009-04-09T00:00:00", "id": "OPENVAS:1361412562310830567", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310830567", "type": "openvas", "title": "Mandriva Update for boost MDVSA-2008:032 (boost)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for boost MDVSA-2008:032 (boost)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Tavis Ormandy and Will Drewry found that the bost library did not\n properly perform input validation on regular expressions. An attacker\n could exploit this by sening a specially crafted regular expression\n to an application linked against boost and cause a denial of service\n via an application crash.\n\n The updated packages have been patched to correct this issue.\";\n\ntag_affected = \"boost on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64,\n Mandriva Linux 2007.1,\n Mandriva Linux 2007.1/X86_64,\n Mandriva Linux 2008.0,\n Mandriva Linux 2008.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2008-02/msg00002.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.830567\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 14:26:37 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"MDVSA\", value: \"2008:032\");\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_name( \"Mandriva Update for boost MDVSA-2008:032 (boost)\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of boost\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"libboost1\", rpm:\"libboost1~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-devel\", rpm:\"libboost1-devel~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-examples\", rpm:\"libboost1-examples~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-static-devel\", rpm:\"libboost1-static-devel~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost\", rpm:\"boost~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1\", rpm:\"lib64boost1~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-devel\", rpm:\"lib64boost1-devel~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-examples\", rpm:\"lib64boost1-examples~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-static-devel\", rpm:\"lib64boost1-static-devel~1.33.1~5.1mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libboost1\", rpm:\"libboost1~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-devel\", rpm:\"libboost1-devel~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-examples\", rpm:\"libboost1-examples~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-static-devel\", rpm:\"libboost1-static-devel~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost\", rpm:\"boost~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1\", rpm:\"lib64boost1~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-devel\", rpm:\"lib64boost1-devel~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-examples\", rpm:\"lib64boost1-examples~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-static-devel\", rpm:\"lib64boost1-static-devel~1.33.1~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2008.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libboost1\", rpm:\"libboost1~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-devel\", rpm:\"libboost1-devel~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-examples\", rpm:\"libboost1-examples~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libboost1-static-devel\", rpm:\"libboost1-static-devel~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost\", rpm:\"boost~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1\", rpm:\"lib64boost1~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-devel\", rpm:\"lib64boost1-devel~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-examples\", rpm:\"lib64boost1-examples~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64boost1-static-devel\", rpm:\"lib64boost1-static-devel~1.33.1~6.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-01-06T13:07:42", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "Check for the Version of boost", "modified": "2018-01-04T00:00:00", "published": "2012-02-21T00:00:00", "id": "OPENVAS:870563", "href": "http://plugins.openvas.org/nasl.php?oid=870563", "type": "openvas", "title": "RedHat Update for boost RHSA-2012:0305-03", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for boost RHSA-2012:0305-03\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The boost packages provide free, peer-reviewed, portable C++ source\n libraries with emphasis on libraries which work well with the C++ Standard\n Library.\n\n Invalid pointer dereference flaws were found in the way the Boost regular\n expression library processed certain, invalid expressions. An attacker able\n to make an application using the Boost library process a specially-crafted\n regular expression could cause that application to crash or, potentially,\n execute arbitrary code with the privileges of the user running the\n application. (CVE-2008-0171)\n\n NULL pointer dereference flaws were found in the way the Boost regular\n expression library processed certain, invalid expressions. An attacker able\n to make an application using the Boost library process a specially-crafted\n regular expression could cause that application to crash. (CVE-2008-0172)\n\n Red Hat would like to thank Will Drewry for reporting these issues.\n\n This update also fixes the following bugs:\n\n * Prior to this update, the construction of a regular expression object\n could fail when several regular expression objects were created\n simultaneously, such as in a multi-threaded program. With this update, the\n object variables have been moved from the shared memory to the stack. Now,\n the constructing function is thread safe. (BZ#472384)\n\n * Prior to this update, header files in several Boost libraries contained\n preprocessor directives that the GNU Compiler Collection (GCC) 4.4 could\n not handle. This update instead uses equivalent constructs that are\n standard C. (BZ#567722)\n\n All users of boost are advised to upgrade to these updated packages, which\n fix these issues.\";\n\ntag_affected = \"boost on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2012-February/msg00054.html\");\n script_id(870563);\n script_version(\"$Revision: 8285 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-04 07:29:16 +0100 (Thu, 04 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-21 18:57:09 +0530 (Tue, 21 Feb 2012)\");\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"RHSA\", value: \"2012:0305-03\");\n script_name(\"RedHat Update for boost RHSA-2012:0305-03\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of boost\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"boost\", rpm:\"boost~1.33.1~15.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost-debuginfo\", rpm:\"boost-debuginfo~1.33.1~15.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost-devel\", rpm:\"boost-devel~1.33.1~15.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"boost-doc\", rpm:\"boost-doc~1.33.1~15.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-12-04T11:28:33", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-570-1", "modified": "2017-12-01T00:00:00", "published": "2009-03-23T00:00:00", "id": "OPENVAS:840297", "href": "http://plugins.openvas.org/nasl.php?oid=840297", "type": "openvas", "title": "Ubuntu Update for boost vulnerabilities USN-570-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_570_1.nasl 7969 2017-12-01 09:23:16Z santu $\n#\n# Ubuntu Update for boost vulnerabilities USN-570-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Will Drewry and Tavis Ormandy discovered that the boost library\n did not properly perform input validation on regular expressions.\n An attacker could send a specially crafted regular expression to\n an application linked against boost and cause a denial of service\n via application crash.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-570-1\";\ntag_affected = \"boost vulnerabilities on Ubuntu 6.06 LTS ,\n Ubuntu 6.10 ,\n Ubuntu 7.04 ,\n Ubuntu 7.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-570-1/\");\n script_id(840297);\n script_version(\"$Revision: 7969 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 10:23:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"USN\", value: \"570-1\");\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_name( \"Ubuntu Update for boost vulnerabilities USN-570-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU7.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libboost-dbg\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-dev\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-python-dev\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-python1.33.1\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"bcp\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-date-time-dev\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-date-time1.33.1\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-filesystem-dev\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-filesystem1.33.1\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-graph-dev\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-graph1.33.1\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-iostreams-dev\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-iostreams1.33.1\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-program-options-dev\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-program-options1.33.1\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-regex-dev\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-regex1.33.1\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-serialization-dev\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-signals-dev\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-signals1.33.1\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-test-dev\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-test1.33.1\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-thread-dev\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-thread1.33.1\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-wave-dev\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-doc\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pyste\", ver:\"1.33.1-9ubuntu3.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.06 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libboost-dev\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-python-dev\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-python1.33.1\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"bcp\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-date-time-dev\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-date-time1.33.1\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-dbg\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-filesystem-dev\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-filesystem1.33.1\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-graph-dev\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-graph1.33.1\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-iostreams-dev\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-iostreams1.33.1\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-program-options-dev\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-program-options1.33.1\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-regex-dev\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-regex1.33.1\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-serialization-dev\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-signals-dev\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-signals1.33.1\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-test-dev\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-test1.33.1\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-thread-dev\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-thread1.33.1\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-wave-dev\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-doc\", ver:\"1.33.1-2ubuntu0.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libboost-dbg\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-dev\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-python-dev\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-python1.33.1\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"bcp\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-date-time-dev\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-date-time1.33.1\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-filesystem-dev\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-filesystem1.33.1\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-graph-dev\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-graph1.33.1\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-iostreams-dev\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-iostreams1.33.1\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-program-options-dev\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-program-options1.33.1\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-regex-dev\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-regex1.33.1\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-serialization-dev\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-signals-dev\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-signals1.33.1\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-test-dev\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-test1.33.1\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-thread-dev\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-thread1.33.1\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-wave-dev\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-doc\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pyste\", ver:\"1.33.1-7ubuntu1.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU7.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libboost-dbg\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-dev\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-python-dev\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-python1.34.1\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"bcp\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-date-time-dev\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-date-time1.34.1\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-filesystem-dev\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-filesystem1.34.1\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-graph-dev\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-graph1.34.1\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-iostreams-dev\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-iostreams1.34.1\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-program-options-dev\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-program-options1.34.1\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-regex-dev\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-regex1.34.1\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-serialization-dev\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-serialization1.34.1\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-signals-dev\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-signals1.34.1\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-test-dev\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-test1.34.1\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-thread-dev\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-thread1.34.1\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-wave-dev\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-wave1.34.1\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libboost-doc\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pyste\", ver:\"1.34.1-2ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:49:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "The remote host is missing updates announced in\nadvisory GLSA 200802-08.", "modified": "2017-07-07T00:00:00", "published": "2008-09-24T00:00:00", "id": "OPENVAS:60385", "href": "http://plugins.openvas.org/nasl.php?oid=60385", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200802-08 (boost)", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Two vulnerabilities have been reported in Boost, each one possibly\nresulting in a Denial of Service.\";\ntag_solution = \"All Boost users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-libs/boost-1.34.1-r2'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200802-08\nhttp://bugs.gentoo.org/show_bug.cgi?id=205955\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200802-08.\";\n\n \n\nif(description)\n{\n script_id(60385);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200802-08 (boost)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"dev-libs/boost\", unaffected: make_list(\"ge 1.34.1-r2\"), vulnerable: make_list(\"lt 1.34.1-r2\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-25T10:56:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "Check for the Version of boost", "modified": "2017-07-10T00:00:00", "published": "2009-02-17T00:00:00", "id": "OPENVAS:860401", "href": "http://plugins.openvas.org/nasl.php?oid=860401", "type": "openvas", "title": "Fedora Update for boost FEDORA-2008-0754", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for boost FEDORA-2008-0754\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"boost on Fedora 8\";\ntag_insight = \"Boost provides free peer-reviewed portable C++ source libraries. The\n emphasis is on libraries which work well with the C++ Standard\n Library, in the hopes of establishing "existing practice" for\n extensions and providing reference implementations so that the Boost\n libraries are suitable for eventual standardization. (Some of the\n libraries have already been proposed for inclusion in the C++\n Standards Committee's upcoming C++ Standard Library Technical Report.)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00377.html\");\n script_id(860401);\n script_version(\"$Revision: 6623 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:10:20 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-17 17:12:43 +0100 (Tue, 17 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"FEDORA\", value: \"2008-0754\");\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_name( \"Fedora Update for boost FEDORA-2008-0754\");\n\n script_summary(\"Check for the Version of boost\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC8\")\n{\n\n if ((res = isrpmvuln(pkg:\"boost\", rpm:\"boost~1.34.1~7.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:36:05", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "Oracle Linux Local Security Checks ELSA-2012-0305", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123961", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123961", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2012-0305", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2012-0305.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123961\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:10:52 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2012-0305\");\n script_tag(name:\"insight\", value:\"ELSA-2012-0305 - boost security and bug fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2012-0305\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2012-0305.html\");\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"boost\", rpm:\"boost~1.33.1~15.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"boost-devel\", rpm:\"boost-devel~1.33.1~15.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"boost-doc\", rpm:\"boost-doc~1.33.1~15.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:23", "bulletinFamily": "unix", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "edition": 1, "description": "### Background\n\nBoost is a set of C++ libraries, including the Boost.Regex library to process regular expressions. \n\n### Description\n\nTavis Ormandy and Will Drewry from the Google Security Team reported a failed assertion in file regex/v4/perl_matcher_non_recursive.hpp (CVE-2008-0171) and a NULL pointer dereference in function get_repeat_type() file basic_regex_creator.hpp (CVE-2008-0172) when processing regular expressions. \n\n### Impact\n\nA remote attacker could provide specially crafted regular expressions to an application using Boost, resulting in a crash. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Boost users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-libs/boost-1.34.1-r2\"", "modified": "2008-02-14T00:00:00", "published": "2008-02-14T00:00:00", "id": "GLSA-200802-08", "href": "https://security.gentoo.org/glsa/200802-08", "type": "gentoo", "title": "Boost: Denial of Service", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "redhat": [{"lastseen": "2019-08-13T18:45:43", "bulletinFamily": "unix", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "The boost packages provide free, peer-reviewed, portable C++ source\nlibraries with emphasis on libraries which work well with the C++ Standard\nLibrary.\n\nInvalid pointer dereference flaws were found in the way the Boost regular\nexpression library processed certain, invalid expressions. An attacker able\nto make an application using the Boost library process a specially-crafted\nregular expression could cause that application to crash or, potentially,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2008-0171)\n\nNULL pointer dereference flaws were found in the way the Boost regular\nexpression library processed certain, invalid expressions. An attacker able\nto make an application using the Boost library process a specially-crafted\nregular expression could cause that application to crash. (CVE-2008-0172)\n\nRed Hat would like to thank Will Drewry for reporting these issues.\n\nThis update also fixes the following bugs:\n\n* Prior to this update, the construction of a regular expression object\ncould fail when several regular expression objects were created\nsimultaneously, such as in a multi-threaded program. With this update, the\nobject variables have been moved from the shared memory to the stack. Now,\nthe constructing function is thread safe. (BZ#472384)\n\n* Prior to this update, header files in several Boost libraries contained\npreprocessor directives that the GNU Compiler Collection (GCC) 4.4 could\nnot handle. This update instead uses equivalent constructs that are\nstandard C. (BZ#567722)\n\nAll users of boost are advised to upgrade to these updated packages, which\nfix these issues.\n", "modified": "2017-09-08T12:06:42", "published": "2012-02-21T05:00:00", "id": "RHSA-2012:0305", "href": "https://access.redhat.com/errata/RHSA-2012:0305", "type": "redhat", "title": "(RHSA-2012:0305) Low: boost security and bug fix update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "nessus": [{"lastseen": "2021-01-07T11:51:49", "description": "Tavis Ormandy and Will Drewry found that the bost library did not\nproperly perform input validation on regular expressions. An attacker\ncould exploit this by sening a specially crafted regular expression to\nan application linked against boost and cause a denial of service via\nan application crash.\n\nThe updated packages have been patched to correct this issue.", "edition": 24, "published": "2009-04-23T00:00:00", "title": "Mandriva Linux Security Advisory : boost (MDVSA-2008:032)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "modified": "2009-04-23T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:lib64boost1-examples", "cpe:/o:mandriva:linux:2007", "p-cpe:/a:mandriva:linux:lib64boost1-devel", "p-cpe:/a:mandriva:linux:libboost1-static-devel", "cpe:/o:mandriva:linux:2007.1", "cpe:/o:mandriva:linux:2008.0", "p-cpe:/a:mandriva:linux:libboost1-devel", "p-cpe:/a:mandriva:linux:libboost1-examples", "p-cpe:/a:mandriva:linux:lib64boost1-static-devel", "p-cpe:/a:mandriva:linux:libboost1", "p-cpe:/a:mandriva:linux:lib64boost1"], "id": "MANDRIVA_MDVSA-2008-032.NASL", "href": "https://www.tenable.com/plugins/nessus/37818", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2008:032. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(37818);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_bugtraq_id(27325);\n script_xref(name:\"MDVSA\", value:\"2008:032\");\n\n script_name(english:\"Mandriva Linux Security Advisory : boost (MDVSA-2008:032)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Tavis Ormandy and Will Drewry found that the bost library did not\nproperly perform input validation on regular expressions. An attacker\ncould exploit this by sening a specially crafted regular expression to\nan application linked against boost and cause a denial of service via\nan application crash.\n\nThe updated packages have been patched to correct this issue.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64boost1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64boost1-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64boost1-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64boost1-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libboost1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libboost1-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libboost1-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libboost1-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2007\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2007.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2008.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/02/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/04/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64boost1-1.33.1-3.1mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64boost1-devel-1.33.1-3.1mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64boost1-examples-1.33.1-3.1mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64boost1-static-devel-1.33.1-3.1mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libboost1-1.33.1-3.1mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libboost1-devel-1.33.1-3.1mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libboost1-examples-1.33.1-3.1mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libboost1-static-devel-1.33.1-3.1mdv2007.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64boost1-1.33.1-5.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64boost1-devel-1.33.1-5.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64boost1-examples-1.33.1-5.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64boost1-static-devel-1.33.1-5.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libboost1-1.33.1-5.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libboost1-devel-1.33.1-5.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libboost1-examples-1.33.1-5.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libboost1-static-devel-1.33.1-5.1mdv2007.1\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64boost1-1.33.1-6.1mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64boost1-devel-1.33.1-6.1mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64boost1-examples-1.33.1-6.1mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64boost1-static-devel-1.33.1-6.1mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libboost1-1.33.1-6.1mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libboost1-devel-1.33.1-6.1mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libboost1-examples-1.33.1-6.1mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libboost1-static-devel-1.33.1-6.1mdv2008.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-07T10:52:19", "description": "The remote host is affected by the vulnerability described in GLSA-200802-08\n(Boost: Denial of Service)\n\n Tavis Ormandy and Will Drewry from the Google Security Team reported a\n failed assertion in file regex/v4/perl_matcher_non_recursive.hpp\n (CVE-2008-0171) and a NULL pointer dereference in function\n get_repeat_type() file basic_regex_creator.hpp (CVE-2008-0172) when\n processing regular expressions.\n \nImpact :\n\n A remote attacker could provide specially crafted regular expressions\n to an application using Boost, resulting in a crash.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 24, "published": "2008-02-18T00:00:00", "title": "GLSA-200802-08 : Boost: Denial of Service", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "modified": "2008-02-18T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:boost"], "id": "GENTOO_GLSA-200802-08.NASL", "href": "https://www.tenable.com/plugins/nessus/31110", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200802-08.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(31110);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_bugtraq_id(27325);\n script_xref(name:\"GLSA\", value:\"200802-08\");\n\n script_name(english:\"GLSA-200802-08 : Boost: Denial of Service\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200802-08\n(Boost: Denial of Service)\n\n Tavis Ormandy and Will Drewry from the Google Security Team reported a\n failed assertion in file regex/v4/perl_matcher_non_recursive.hpp\n (CVE-2008-0171) and a NULL pointer dereference in function\n get_repeat_type() file basic_regex_creator.hpp (CVE-2008-0172) when\n processing regular expressions.\n \nImpact :\n\n A remote attacker could provide specially crafted regular expressions\n to an application using Boost, resulting in a crash.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200802-08\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Boost users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-libs/boost-1.34.1-r2'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:boost\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/02/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/02/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"dev-libs/boost\", unaffected:make_list(\"ge 1.34.1-r2\"), vulnerable:make_list(\"lt 1.34.1-r2\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Boost\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T10:06:17", "description": " - Wed Jan 16 2008 Petr Machata <pmachata at redhat.com>\n 1.34.1-7\n\n - Fixes for boost.regex (rev 42674).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 23, "published": "2008-03-13T00:00:00", "title": "Fedora 8 : boost-1.34.1-7.fc8 (2008-0754)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "modified": "2008-03-13T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:8", "p-cpe:/a:fedoraproject:fedora:boost"], "id": "FEDORA_2008-0754.NASL", "href": "https://www.tenable.com/plugins/nessus/31427", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2008-0754.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(31427);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_xref(name:\"FEDORA\", value:\"2008-0754\");\n\n script_name(english:\"Fedora 8 : boost-1.34.1-7.fc8 (2008-0754)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Wed Jan 16 2008 Petr Machata <pmachata at redhat.com>\n 1.34.1-7\n\n - Fixes for boost.regex (rev 42674).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=428316\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=428320\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=428975\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2008-March/008716.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?8ed000ef\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected boost package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:boost\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:8\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/03/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/03/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 8.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC8\", reference:\"boost-1.34.1-7.fc8\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"boost\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T10:06:18", "description": " - Wed Jan 16 2008 Petr Machata <pmachata at redhat.com> -\n 1.33.1-15\n\n - Fixes for boost.regex.\n\n - Mon Nov 19 2007 Petr Machata <pmachata at redhat.com>\n - 1.33.1-14\n\n - Apply/testsuite ambiguous option patch from James\n Philbin\n\n - Resolves: #369581\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 23, "published": "2008-01-27T00:00:00", "title": "Fedora 7 : boost-1.33.1-15.fc7 (2008-0880)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "modified": "2008-01-27T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:7", "p-cpe:/a:fedoraproject:fedora:boost-devel-static", "p-cpe:/a:fedoraproject:fedora:boost", "p-cpe:/a:fedoraproject:fedora:boost-doc", "p-cpe:/a:fedoraproject:fedora:boost-devel", "p-cpe:/a:fedoraproject:fedora:boost-debuginfo"], "id": "FEDORA_2008-0880.NASL", "href": "https://www.tenable.com/plugins/nessus/30078", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2008-0880.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(30078);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_bugtraq_id(27325);\n script_xref(name:\"FEDORA\", value:\"2008-0880\");\n\n script_name(english:\"Fedora 7 : boost-1.33.1-15.fc7 (2008-0880)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Wed Jan 16 2008 Petr Machata <pmachata at redhat.com> -\n 1.33.1-15\n\n - Fixes for boost.regex.\n\n - Mon Nov 19 2007 Petr Machata <pmachata at redhat.com>\n - 1.33.1-14\n\n - Apply/testsuite ambiguous option patch from James\n Philbin\n\n - Resolves: #369581\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=428316\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=428320\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=428974\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2008-January/007113.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?081b9358\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:boost\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:boost-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:boost-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:boost-devel-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:boost-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:7\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/01/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 7.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC7\", reference:\"boost-1.33.1-15.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"boost-debuginfo-1.33.1-15.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"boost-devel-1.33.1-15.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"boost-devel-static-1.33.1-15.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"boost-doc-1.33.1-15.fc7\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"boost / boost-debuginfo / boost-devel / boost-devel-static / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T13:46:27", "description": "The boost packages provide free, peer-reviewed, portable C++ source\nlibraries with emphasis on libraries which work well with the C++\nStandard Library.\n\nInvalid pointer dereference flaws were found in the way the Boost\nregular expression library processed certain, invalid expressions. An\nattacker able to make an application using the Boost library process a\nspecially crafted regular expression could cause that application to\ncrash or, potentially, execute arbitrary code with the privileges of\nthe user running the application. (CVE-2008-0171)\n\nNULL pointer dereference flaws were found in the way the Boost regular\nexpression library processed certain, invalid expressions. An attacker\nable to make an application using the Boost library process a\nspecially crafted regular expression could cause that application to\ncrash. (CVE-2008-0172)\n\nThis update also fixes the following bugs :\n\n - Prior to this update, the construction of a regular\n expression object could fail when several regular\n expression objects were created simultaneously, such as\n in a multi-threaded program. With this update, the\n object variables have been moved from the shared memory\n to the stack. Now, the constructing function is thread\n safe.\n\n - Prior to this update, header files in several Boost\n libraries contained preprocessor directives that the GNU\n Compiler Collection (GCC) 4.4 could not handle. This\n update instead uses equivalent constructs that are\n standard C.\n\nAll users of boost are advised to upgrade to these updated packages,\nwhich fix these issues.", "edition": 14, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : boost on SL5.x i386/x86_64 (20120221)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "modified": "2012-08-01T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:boost-doc", "p-cpe:/a:fermilab:scientific_linux:boost", "p-cpe:/a:fermilab:scientific_linux:boost-devel", "x-cpe:/o:fermilab:scientific_linux", "p-cpe:/a:fermilab:scientific_linux:boost-debuginfo"], "id": "SL_20120221_BOOST_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/61256", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(61256);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n\n script_name(english:\"Scientific Linux Security Update : boost on SL5.x i386/x86_64 (20120221)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The boost packages provide free, peer-reviewed, portable C++ source\nlibraries with emphasis on libraries which work well with the C++\nStandard Library.\n\nInvalid pointer dereference flaws were found in the way the Boost\nregular expression library processed certain, invalid expressions. An\nattacker able to make an application using the Boost library process a\nspecially crafted regular expression could cause that application to\ncrash or, potentially, execute arbitrary code with the privileges of\nthe user running the application. (CVE-2008-0171)\n\nNULL pointer dereference flaws were found in the way the Boost regular\nexpression library processed certain, invalid expressions. An attacker\nable to make an application using the Boost library process a\nspecially crafted regular expression could cause that application to\ncrash. (CVE-2008-0172)\n\nThis update also fixes the following bugs :\n\n - Prior to this update, the construction of a regular\n expression object could fail when several regular\n expression objects were created simultaneously, such as\n in a multi-threaded program. With this update, the\n object variables have been moved from the shared memory\n to the stack. Now, the constructing function is thread\n safe.\n\n - Prior to this update, header files in several Boost\n libraries contained preprocessor directives that the GNU\n Compiler Collection (GCC) 4.4 could not handle. This\n update instead uses equivalent constructs that are\n standard C.\n\nAll users of boost are advised to upgrade to these updated packages,\nwhich fix these issues.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1203&L=scientific-linux-errata&T=0&P=2917\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?11e11709\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:boost\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:boost-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:boost-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:boost-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/01/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/02/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 5.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"boost-1.33.1-15.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"boost-debuginfo-1.33.1-15.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"boost-devel-1.33.1-15.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"boost-doc-1.33.1-15.el5\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"boost / boost-debuginfo / boost-devel / boost-doc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T13:10:28", "description": "Updated boost packages that fix two security issues and two bugs are\nnow available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe boost packages provide free, peer-reviewed, portable C++ source\nlibraries with emphasis on libraries which work well with the C++\nStandard Library.\n\nInvalid pointer dereference flaws were found in the way the Boost\nregular expression library processed certain, invalid expressions. An\nattacker able to make an application using the Boost library process a\nspecially crafted regular expression could cause that application to\ncrash or, potentially, execute arbitrary code with the privileges of\nthe user running the application. (CVE-2008-0171)\n\nNULL pointer dereference flaws were found in the way the Boost regular\nexpression library processed certain, invalid expressions. An attacker\nable to make an application using the Boost library process a\nspecially crafted regular expression could cause that application to\ncrash. (CVE-2008-0172)\n\nRed Hat would like to thank Will Drewry for reporting these issues.\n\nThis update also fixes the following bugs :\n\n* Prior to this update, the construction of a regular expression\nobject could fail when several regular expression objects were created\nsimultaneously, such as in a multi-threaded program. With this update,\nthe object variables have been moved from the shared memory to the\nstack. Now, the constructing function is thread safe. (BZ#472384)\n\n* Prior to this update, header files in several Boost libraries\ncontained preprocessor directives that the GNU Compiler Collection\n(GCC) 4.4 could not handle. This update instead uses equivalent\nconstructs that are standard C. (BZ#567722)\n\nAll users of boost are advised to upgrade to these updated packages,\nwhich fix these issues.", "edition": 20, "published": "2012-02-21T00:00:00", "title": "RHEL 5 : boost (RHSA-2012:0305)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "modified": "2012-02-21T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:5", "p-cpe:/a:redhat:enterprise_linux:boost", "p-cpe:/a:redhat:enterprise_linux:boost-debuginfo", "p-cpe:/a:redhat:enterprise_linux:boost-devel", "p-cpe:/a:redhat:enterprise_linux:boost-doc"], "id": "REDHAT-RHSA-2012-0305.NASL", "href": "https://www.tenable.com/plugins/nessus/58059", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:0305. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(58059);\n script_version(\"1.21\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_bugtraq_id(27325);\n script_xref(name:\"RHSA\", value:\"2012:0305\");\n\n script_name(english:\"RHEL 5 : boost (RHSA-2012:0305)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated boost packages that fix two security issues and two bugs are\nnow available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe boost packages provide free, peer-reviewed, portable C++ source\nlibraries with emphasis on libraries which work well with the C++\nStandard Library.\n\nInvalid pointer dereference flaws were found in the way the Boost\nregular expression library processed certain, invalid expressions. An\nattacker able to make an application using the Boost library process a\nspecially crafted regular expression could cause that application to\ncrash or, potentially, execute arbitrary code with the privileges of\nthe user running the application. (CVE-2008-0171)\n\nNULL pointer dereference flaws were found in the way the Boost regular\nexpression library processed certain, invalid expressions. An attacker\nable to make an application using the Boost library process a\nspecially crafted regular expression could cause that application to\ncrash. (CVE-2008-0172)\n\nRed Hat would like to thank Will Drewry for reporting these issues.\n\nThis update also fixes the following bugs :\n\n* Prior to this update, the construction of a regular expression\nobject could fail when several regular expression objects were created\nsimultaneously, such as in a multi-threaded program. With this update,\nthe object variables have been moved from the shared memory to the\nstack. Now, the constructing function is thread safe. (BZ#472384)\n\n* Prior to this update, header files in several Boost libraries\ncontained preprocessor directives that the GNU Compiler Collection\n(GCC) 4.4 could not handle. This update instead uses equivalent\nconstructs that are standard C. (BZ#567722)\n\nAll users of boost are advised to upgrade to these updated packages,\nwhich fix these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2012:0305\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-0171\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-0172\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:boost\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:boost-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:boost-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:boost-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/01/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/02/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/02/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2012:0305\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", reference:\"boost-1.33.1-15.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"boost-debuginfo-1.33.1-15.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"boost-devel-1.33.1-15.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"boost-doc-1.33.1-15.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"boost-doc-1.33.1-15.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"boost-doc-1.33.1-15.el5\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"boost / boost-debuginfo / boost-devel / boost-doc\");\n }\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T14:43:20", "description": "Certain regular expressions could cause the boost library to crash.\n(CVE-2008-0171 / CVE-2008-0172)", "edition": 21, "published": "2008-03-13T00:00:00", "title": "SuSE 10 Security Update : boost (ZYPP Patch Number 4978)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "modified": "2008-03-13T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_BOOST-4978.NASL", "href": "https://www.tenable.com/plugins/nessus/31452", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(31452);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n\n script_name(english:\"SuSE 10 Security Update : boost (ZYPP Patch Number 4978)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Certain regular expressions could cause the boost library to crash.\n(CVE-2008-0171 / CVE-2008-0172)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-0171.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-0172.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 4978.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/02/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/03/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:1, reference:\"boost-1.33.1-17.7\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"boost-1.33.1-17.7\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"boost-devel-1.33.1-17.7\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"boost-doc-1.33.1-17.7\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T12:46:45", "description": "From Red Hat Security Advisory 2012:0305 :\n\nUpdated boost packages that fix two security issues and two bugs are\nnow available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe boost packages provide free, peer-reviewed, portable C++ source\nlibraries with emphasis on libraries which work well with the C++\nStandard Library.\n\nInvalid pointer dereference flaws were found in the way the Boost\nregular expression library processed certain, invalid expressions. An\nattacker able to make an application using the Boost library process a\nspecially crafted regular expression could cause that application to\ncrash or, potentially, execute arbitrary code with the privileges of\nthe user running the application. (CVE-2008-0171)\n\nNULL pointer dereference flaws were found in the way the Boost regular\nexpression library processed certain, invalid expressions. An attacker\nable to make an application using the Boost library process a\nspecially crafted regular expression could cause that application to\ncrash. (CVE-2008-0172)\n\nRed Hat would like to thank Will Drewry for reporting these issues.\n\nThis update also fixes the following bugs :\n\n* Prior to this update, the construction of a regular expression\nobject could fail when several regular expression objects were created\nsimultaneously, such as in a multi-threaded program. With this update,\nthe object variables have been moved from the shared memory to the\nstack. Now, the constructing function is thread safe. (BZ#472384)\n\n* Prior to this update, header files in several Boost libraries\ncontained preprocessor directives that the GNU Compiler Collection\n(GCC) 4.4 could not handle. This update instead uses equivalent\nconstructs that are standard C. (BZ#567722)\n\nAll users of boost are advised to upgrade to these updated packages,\nwhich fix these issues.", "edition": 21, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 5 : boost (ELSA-2012-0305)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:boost-devel", "p-cpe:/a:oracle:linux:boost", "p-cpe:/a:oracle:linux:boost-doc", "cpe:/o:oracle:linux:5"], "id": "ORACLELINUX_ELSA-2012-0305.NASL", "href": "https://www.tenable.com/plugins/nessus/68476", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2012:0305 and \n# Oracle Linux Security Advisory ELSA-2012-0305 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68476);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_bugtraq_id(27325);\n script_xref(name:\"RHSA\", value:\"2012:0305\");\n\n script_name(english:\"Oracle Linux 5 : boost (ELSA-2012-0305)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2012:0305 :\n\nUpdated boost packages that fix two security issues and two bugs are\nnow available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe boost packages provide free, peer-reviewed, portable C++ source\nlibraries with emphasis on libraries which work well with the C++\nStandard Library.\n\nInvalid pointer dereference flaws were found in the way the Boost\nregular expression library processed certain, invalid expressions. An\nattacker able to make an application using the Boost library process a\nspecially crafted regular expression could cause that application to\ncrash or, potentially, execute arbitrary code with the privileges of\nthe user running the application. (CVE-2008-0171)\n\nNULL pointer dereference flaws were found in the way the Boost regular\nexpression library processed certain, invalid expressions. An attacker\nable to make an application using the Boost library process a\nspecially crafted regular expression could cause that application to\ncrash. (CVE-2008-0172)\n\nRed Hat would like to thank Will Drewry for reporting these issues.\n\nThis update also fixes the following bugs :\n\n* Prior to this update, the construction of a regular expression\nobject could fail when several regular expression objects were created\nsimultaneously, such as in a multi-threaded program. With this update,\nthe object variables have been moved from the shared memory to the\nstack. Now, the constructing function is thread safe. (BZ#472384)\n\n* Prior to this update, header files in several Boost libraries\ncontained preprocessor directives that the GNU Compiler Collection\n(GCC) 4.4 could not handle. This update instead uses equivalent\nconstructs that are standard C. (BZ#567722)\n\nAll users of boost are advised to upgrade to these updated packages,\nwhich fix these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2012-March/002656.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected boost packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:boost\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:boost-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:boost-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/01/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/03/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL5\", reference:\"boost-1.33.1-15.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"boost-devel-1.33.1-15.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"boost-doc-1.33.1-15.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"boost / boost-devel / boost-doc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T14:43:20", "description": "Certain regular expressions could cause the boost library to crash\n(CVE-2008-0171, CVE-2008-0172).", "edition": 23, "published": "2008-03-13T00:00:00", "title": "openSUSE 10 Security Update : boost (boost-4946)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "modified": "2008-03-13T00:00:00", "cpe": ["cpe:/o:novell:opensuse:10.3", "p-cpe:/a:novell:opensuse:boost", "cpe:/o:novell:opensuse:10.2", "p-cpe:/a:novell:opensuse:boost-devel", "cpe:/o:novell:opensuse:10.1"], "id": "SUSE_BOOST-4946.NASL", "href": "https://www.tenable.com/plugins/nessus/31451", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update boost-4946.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(31451);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n\n script_name(english:\"openSUSE 10 Security Update : boost (boost-4946)\");\n script_summary(english:\"Check for the boost-4946 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Certain regular expressions could cause the boost library to crash\n(CVE-2008-0171, CVE-2008-0172).\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected boost packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:boost\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:boost-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/03/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1|SUSE10\\.2|SUSE10\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1 / 10.2 / 10.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"boost-1.33.1-17.7\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"boost-devel-1.33.1-17.7\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"boost-1.33.1-44\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"boost-devel-1.33.1-44\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"boost-1.33.1-108.5\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"boost-devel-1.33.1-108.5\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"boost / boost-devel\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-20T15:44:08", "description": "Will Drewry and Tavis Ormandy discovered that the boost library did\nnot properly perform input validation on regular expressions. An\nattacker could send a specially crafted regular expression to an\napplication linked against boost and cause a denial of service via\napplication crash.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 25, "published": "2008-01-18T00:00:00", "title": "Ubuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : boost vulnerabilities (USN-570-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "modified": "2008-01-18T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:libboost-serialization-dev", "p-cpe:/a:canonical:ubuntu_linux:libboost-thread1.34.1", "cpe:/o:canonical:ubuntu_linux:7.10", "p-cpe:/a:canonical:ubuntu_linux:libboost-filesystem1.34.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-graph1.33.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-thread-dev", "p-cpe:/a:canonical:ubuntu_linux:libboost-filesystem-dev", "cpe:/o:canonical:ubuntu_linux:6.10", "p-cpe:/a:canonical:ubuntu_linux:libboost-regex1.34.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-signals-dev", "p-cpe:/a:canonical:ubuntu_linux:libboost-python1.33.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-regex-dev", "p-cpe:/a:canonical:ubuntu_linux:bcp", "p-cpe:/a:canonical:ubuntu_linux:libboost-filesystem1.33.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-iostreams-dev", "p-cpe:/a:canonical:ubuntu_linux:libboost-dev", "p-cpe:/a:canonical:ubuntu_linux:libboost-graph1.34.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-thread1.33.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-test1.34.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-python1.34.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-signals1.33.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-program-options1.33.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-doc", "p-cpe:/a:canonical:ubuntu_linux:libboost-regex1.33.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-dbg", "p-cpe:/a:canonical:ubuntu_linux:libboost-wave1.34.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-date-time-dev", "p-cpe:/a:canonical:ubuntu_linux:libboost-wave-dev", "p-cpe:/a:canonical:ubuntu_linux:libboost-iostreams1.33.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-python-dev", "p-cpe:/a:canonical:ubuntu_linux:libboost-date-time1.34.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-program-options1.34.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-serialization1.34.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-program-options-dev", "p-cpe:/a:canonical:ubuntu_linux:pyste", "p-cpe:/a:canonical:ubuntu_linux:libboost-test-dev", "p-cpe:/a:canonical:ubuntu_linux:libboost-iostreams1.34.1", "cpe:/o:canonical:ubuntu_linux:7.04", "p-cpe:/a:canonical:ubuntu_linux:libboost-signals1.34.1", "p-cpe:/a:canonical:ubuntu_linux:libboost-graph-dev", "p-cpe:/a:canonical:ubuntu_linux:libboost-test1.33.1", "cpe:/o:canonical:ubuntu_linux:6.06:-:lts", "p-cpe:/a:canonical:ubuntu_linux:libboost-date-time1.33.1"], "id": "UBUNTU_USN-570-1.NASL", "href": "https://www.tenable.com/plugins/nessus/30018", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-570-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(30018);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2008-0171\", \"CVE-2008-0172\");\n script_xref(name:\"USN\", value:\"570-1\");\n\n script_name(english:\"Ubuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : boost vulnerabilities (USN-570-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Will Drewry and Tavis Ormandy discovered that the boost library did\nnot properly perform input validation on regular expressions. An\nattacker could send a specially crafted regular expression to an\napplication linked against boost and cause a denial of service via\napplication crash.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/570-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:bcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-date-time-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-date-time1.33.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-date-time1.34.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-filesystem-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-filesystem1.33.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-filesystem1.34.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-graph-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-graph1.33.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-graph1.34.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-iostreams-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-iostreams1.33.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-iostreams1.34.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-program-options-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-program-options1.33.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-program-options1.34.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-python-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-python1.33.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-python1.34.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-regex-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-regex1.33.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-regex1.34.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-serialization-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-serialization1.34.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-signals-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-signals1.33.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-signals1.34.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-test-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-test1.33.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-test1.34.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-thread-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-thread1.33.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-thread1.34.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-wave-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libboost-wave1.34.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:pyste\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.06:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/01/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(6\\.06|6\\.10|7\\.04|7\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 6.06 / 6.10 / 7.04 / 7.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"6.06\", pkgname:\"bcp\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-date-time-dev\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-date-time1.33.1\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-dbg\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-dev\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-doc\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-filesystem-dev\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-filesystem1.33.1\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-graph-dev\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-graph1.33.1\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-iostreams-dev\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-iostreams1.33.1\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-program-options-dev\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-program-options1.33.1\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-python-dev\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-python1.33.1\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-regex-dev\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-regex1.33.1\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-serialization-dev\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-signals-dev\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-signals1.33.1\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-test-dev\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-test1.33.1\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-thread-dev\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-thread1.33.1\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libboost-wave-dev\", pkgver:\"1.33.1-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"bcp\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-date-time-dev\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-date-time1.33.1\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-dbg\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-dev\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-doc\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-filesystem-dev\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-filesystem1.33.1\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-graph-dev\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-graph1.33.1\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-iostreams-dev\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-iostreams1.33.1\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-program-options-dev\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-program-options1.33.1\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-python-dev\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-python1.33.1\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-regex-dev\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-regex1.33.1\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-serialization-dev\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-signals-dev\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-signals1.33.1\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-test-dev\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-test1.33.1\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-thread-dev\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-thread1.33.1\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libboost-wave-dev\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"pyste\", pkgver:\"1.33.1-7ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"bcp\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-date-time-dev\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-date-time1.33.1\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-dbg\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-dev\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-doc\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-filesystem-dev\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-filesystem1.33.1\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-graph-dev\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-graph1.33.1\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-iostreams-dev\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-iostreams1.33.1\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-program-options-dev\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-program-options1.33.1\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-python-dev\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-python1.33.1\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-regex-dev\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-regex1.33.1\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-serialization-dev\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-signals-dev\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-signals1.33.1\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-test-dev\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-test1.33.1\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-thread-dev\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-thread1.33.1\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libboost-wave-dev\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"pyste\", pkgver:\"1.33.1-9ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"bcp\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-date-time-dev\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-date-time1.34.1\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-dbg\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-dev\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-doc\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-filesystem-dev\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-filesystem1.34.1\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-graph-dev\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-graph1.34.1\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-iostreams-dev\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-iostreams1.34.1\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-program-options-dev\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-program-options1.34.1\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-python-dev\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-python1.34.1\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-regex-dev\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-regex1.34.1\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-serialization-dev\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-serialization1.34.1\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-signals-dev\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-signals1.34.1\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-test-dev\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-test1.34.1\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-thread-dev\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-thread1.34.1\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-wave-dev\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libboost-wave1.34.1\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"pyste\", pkgver:\"1.34.1-2ubuntu1.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bcp / libboost-date-time-dev / libboost-date-time1.33.1 / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:35:53", "bulletinFamily": "unix", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "[1.33.1-15]\n- Fix bugs in parsing invalid regexps\n- Resolves: #766755\n[1.33.1-14]\n- Delete leftover .orig files after patches are successfully applied\n[1.33.1-13]\n- GCC 4.4 fixes\n- Resolves: #567722\n[1.33.1-11]\n- Add a fix for thread safety bug in boost::regex\n- Build with -fno-strict-aliasing due to the sheer amount of warnings\n that we get.\n- Resolves: #472384", "edition": 4, "modified": "2012-03-01T00:00:00", "published": "2012-03-01T00:00:00", "id": "ELSA-2012-0305", "href": "http://linux.oracle.com/errata/ELSA-2012-0305.html", "title": "boost security and bug fix update", "type": "oraclelinux", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:24", "bulletinFamily": "software", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "=========================================================== \r\nUbuntu Security Notice USN-570-1 January 16, 2008\r\nboost vulnerabilities\r\nCVE-2008-0171, CVE-2008-0172\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 6.06 LTS\r\nUbuntu 6.10\r\nUbuntu 7.04\r\nUbuntu 7.10\r\n\r\nThis advisory also applies to the corresponding versions of\r\nKubuntu, Edubuntu, and Xubuntu.\r\n\r\nThe problem can be corrected by upgrading your system to the\r\nfollowing package versions:\r\n\r\nUbuntu 6.06 LTS:\r\n libboost-regex1.33.1 1.33.1-2ubuntu0.1\r\n\r\nUbuntu 6.10:\r\n libboost-regex1.33.1 1.33.1-7ubuntu1.1\r\n\r\nUbuntu 7.04:\r\n libboost-regex1.33.1 1.33.1-9ubuntu3.1\r\n\r\nUbuntu 7.10:\r\n libboost-regex1.34.1 1.34.1-2ubuntu1.1\r\n\r\nIn general, a standard system upgrade is sufficient to effect the\r\nnecessary changes.\r\n\r\nDetails follow:\r\n\r\nWill Drewry and Tavis Ormandy discovered that the boost library \r\ndid not properly perform input validation on regular expressions.\r\nAn attacker could send a specially crafted regular expression to\r\nan application linked against boost and cause a denial of service\r\nvia application crash.\r\n\r\n\r\nUpdated packages for Ubuntu 6.06 LTS:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/boost_1.33.1-2ubuntu0.1.diff.gz\r\n Size/MD5: 51386 a699d928d816371a768423f2db9bf260\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/boost_1.33.1-2ubuntu0.1.dsc\r\n Size/MD5: 1387 e0db504429075074054c6bb368d1e502\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/boost_1.33.1.orig.tar.gz\r\n Size/MD5: 14358143 a0be7261bfdc8a6c98a25f964766c7a5\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-doc_1.33.1-2ubuntu0.1_all.deb\r\n Size/MD5: 8265502 ea0e6ce0b0c55f77d04e50ac19fdf2ad\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 1660500 99347a80fac9a308043b798013eb2b98\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 138232 ee8c380751b47ec081dc71fdfb42b434\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.33.1_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 186788 c84d9a1ab9cb60b1a39174b428f904be\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 175432 777ff6fc25949772986a62f485d74e78\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 175518 929ce40039e92dbf97f8f32118e97f36\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.33.1_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 48212 bfcf145f8f889a6ddcdb90714e8ab4b1\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-dbg_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 9458002 7b5b07876b9bd72506a9c19b12f97834\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 77274 48b5edf3adee60ef860022d05ece7ccb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.33.1_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 66168 9de3ddf7eeaa15bf9cb3265b2ba59f9d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 278380 4daed0f3cfa0f09137c7a88228866799\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.33.1_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 146260 ee00603fc1b4400ac9377e8ae62c7756\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 103262 09fdbc4ccc93e86b1165d5e239485ddc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.33.1_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 27706 53c6fe2cdae4b628cc76cf827a35818e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 272784 37b4e6cabed0bf8842b56b03e2eb3811\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.33.1_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 174350 991d9ca91d629c1a2b23b07a723793fa\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 1101864 42b332dbd03b3eb548b44cff7514e4b8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.33.1_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 522434 3aeea17c517745ed8b474fbb7d094b2f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 675406 645ee2a95ae68eb7e96af7afd10b045c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 96016 6e467441b78457f9ab686811fe566431\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.33.1_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 65964 213e40962f0e4ae415334111dd5e8ce6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 599734 dc40b1e27dac6e0bb8855403a1ad0b41\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.33.1_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 329302 2574dd8df2f9bc63d74f38b37b79887f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 23042 b8f440d4b11b4dcbe38343b14f4a1c26\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.33.1_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 32446 ea384488494d0dad744436d915392539\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.33.1-2ubuntu0.1_amd64.deb\r\n Size/MD5: 483696 b41c222d773f78ce7467351ed07c295b\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 1660446 59535c600cb802b6205a1d85f85baf0f\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 138224 73b3f20130e41addd1a0f92d51d2e507\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.33.1_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 179838 a22a5efe084243804e996ca952eeaf9f\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 167386 c9df933d1313849543db09acd8db05c9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 170724 9a6917eca7e9174ec45da1af20c3bcb8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.33.1_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 45600 7c81049c64d880df3f6a2d5aee7221cc\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-dbg_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 9254776 30940d43808cb5a06462cfa9566e1635\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 67850 c8f94181f504c6c01d9e07704296c621\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.33.1_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 61922 bc3ba9a0f57a04592f540bf14fce48de\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 271668 31518b648c91a87b1872c8cde6aa6852\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.33.1_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 139046 c9d9d08ed80ab2f78f76adcbde93ed75\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 103258 5e1cfdf594872e7cbe74277afbc2401f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.33.1_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 27096 effbc4ba3a7e148e8b41ee8227422ead\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 247338 d81de70755572be2f87cdf303415c60d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.33.1_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 167816 c6114e4f60a66660e4909ef35a259f3d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 1045284 2bf5f2b2c03eaa392571c00279c49958\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.33.1_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 522870 a89de4004a493b8f1e26ea23df06ec1b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 614168 2f821652fd2c7e890c02b5b2c371b9a8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 84754 0d31e2a0dc679a7ee710409d4e46cd4c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.33.1_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 63688 5ffa39fefcaab5bd95707922439359d5\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 533272 df44d6d804eb9dc5a3d5336a4978abfe\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.33.1_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 302922 6b6829047ecbc59e359e0f028c7b6e73\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 23044 b59a795378b1a6f4efd04ee243bd43bb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.33.1_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 30870 f0f6e57de41e4ff591fa294d9659eefe\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.33.1-2ubuntu0.1_i386.deb\r\n Size/MD5: 456276 f52c89766c205c90b33779d5438a4e02\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 1660518 7b5294653c7b095671d742d16c4ab728\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 138240 3202a1a1989ca4a61e9dea474c5b8600\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.33.1_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 195056 777bf65be0b60ba4acd5b3d399a69c13\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 177046 ca7492b0173d7f2bdece3d7bd5c84e9c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 175384 04fa10ff07b7bfa10b1d93993bd86514\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.33.1_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 49752 c64cc17ef239df9c5c3f7a76f3063ef4\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-dbg_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 9299168 e4ab252705d06a5ffa82e112c276f57f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 79084 6576e70675c2e26904122db33e2a37d1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.33.1_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 66062 75ec53fe90fcf614e494fe1e11bb4bda\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 286160 47e48cd2147d48b61f47762ab7c70fd4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.33.1_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 126916 8e35624803004346f6491d4503cb55b6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 103254 25dcb80d9748b591f07ea40c30fb6f4f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.33.1_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 28768 0b86cff9aa21ed793e6989b202d3d742\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 276680 bbec8a91ef66d0610ae12c03f7a5b818\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.33.1_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 174260 316ee03b7303710e9bd7b935d52e1073\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 1170644 22a54785fe1bdc817017b3cf3112371b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.33.1_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 524792 c2426c8206bb4b58e57a28e33a4e8283\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 700184 7217a54f2f603b1d02762a4f6c424b77\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 94766 29330b8ba7349f280a1e4d75b8569eff\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.33.1_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 67604 b756b46989a90823e6771876774fdeaf\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 606570 3631b9872b58b0a9aa1fe3588dc5827b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.33.1_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 340848 dbf4101e167a73fc88e0cf33926df4bb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 23038 30ad668448c60d01be1752a18931c8c7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.33.1_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 32900 e00ea285fca87017c23ff4e5bf9a9d80\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.33.1-2ubuntu0.1_powerpc.deb\r\n Size/MD5: 489574 e7e4b3c03b6235e6720be0759cb69943\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 1660542 9f34a55b892faf11f52f2d1d76eeeb27\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 138230 963126fd53dcb85decc7e18305b49e72\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.33.1_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 180996 48368b8255f1edb03d8eeeddb24693d2\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 166800 036c2125e9b9fe9996fe4c41d46e9a3b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 169278 d888f898d0567bfebe1ffff637a86753\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.33.1_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 45466 956ff31e33feb2960d694de63df4fe12\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-dbg_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 9310028 d4e9b4a4c9c05407b9583a355aa633d6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 68326 a80f8732a6cbfa103640c97787f5b732\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.33.1_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 59350 1f19d56a5b851295e29a52b6208ad6ed\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 271896 26985dea7d6dd148483a5d448bb6c799\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.33.1_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 133578 75cc02840bd7400a5f9b3790b2f39a4f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 103260 10b6c92ea2572bef5259a430df58247c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.33.1_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 26930 e681eea1837a0afb5ef9623f91ecbcef\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 240312 b6608c21b563404785371456fca498e9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.33.1_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 163244 d6b18267755ccc6148a9561d3bdbdb7e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 1007936 800309281a6b9107cfe68d06c2690d41\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.33.1_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 498752 6f949a5da49c9322afbe7fbace3dbd70\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 601468 a905ce65c8dcff4eba8fa796f443b803\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 84380 09ea65b00fe5cb189d83fc1d4708514f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.33.1_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 62456 0f552f8999c6050f5c102427523d468b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 528190 770861f8a467dff1303324f7f28c6345\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.33.1_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 310216 1fb46cebb4e44337b9d04cde3182f0bd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 23044 b795d36e46d40ce15b9b37a5dbd90781\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.33.1_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 30024 3eab4d01a21c8d15a95e7c667c6d4f1f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.33.1-2ubuntu0.1_sparc.deb\r\n Size/MD5: 443988 becf3d92cf018b63ed5af7e1b0874c1f\r\n\r\nUpdated packages for Ubuntu 6.10:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/boost_1.33.1-7ubuntu1.1.diff.gz\r\n Size/MD5: 63315 7dfdd22de3a146ed0eda76f634b2438b\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/boost_1.33.1-7ubuntu1.1.dsc\r\n Size/MD5: 1472 e8ef370ee40fcf837032f3ac346d8de4\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/boost_1.33.1.orig.tar.gz\r\n Size/MD5: 14358143 a0be7261bfdc8a6c98a25f964766c7a5\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-doc_1.33.1-7ubuntu1.1_all.deb\r\n Size/MD5: 8297174 426a9785c8a86badf6bf43341e7d3b99\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/pyste_1.33.1-7ubuntu1.1_all.deb\r\n Size/MD5: 47614 7a606cc2827f6a522032b8aae3588ebb\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dbg_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 10383184 45bd685bf151b0395e931379bc79dd45\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 1661224 c5e00527f12b82ac9abf8796ec156734\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 138904 820da67dd110011d39601b216c02b3f5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.33.1_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 182854 d6f8c7c97369ad2ff43cc3596f442994\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 192488 31f8832c2a6c87f4065f4cef414c4b78\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 187002 129936e6fd389a4d25194fb3d8e81088\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.33.1_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 57648 7a2b3ec7612b7df7ed38424456b696a9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 87042 97d5772259f697416858ec0791dbcfbd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.33.1_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 71474 28633fd0ef881ccc0ee829c1523f7812\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 1080238 3c1911fada7649df70f1949e186cd10d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.33.1_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 476986 dc71020e13a343ae8cbf5164a0116545\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 103886 b551b8ed32f0d2bb399fff111fc87a90\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.33.1_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 28760 ef70b1a90689233fbcc861a444fc0036\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 284276 0f05cd6aac978f11355a68c5379fbeab\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.33.1_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 190708 475dc7189c07fbfe6bfe42b09c7d5aca\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 1086956 2ef3fc29bcfe583279aadf2dc4530bd8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.33.1_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 526998 195c5018f83f5d55662cddb21e63caa2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 677210 17628fff758977e0bfc27b65c7caa129\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 91664 ba45fa03745bd27632c5e270c15a66cf\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.33.1_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 63194 07fdc3cfceeeb128ac05f8e1ed6aa836\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 587118 0a84e9506a7678f3e3ec149e634365e4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.33.1_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 333752 b92244195a41eb6ee222bee1d139a841\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 42842 139ed4a77757e1718cc484b5ee987095\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.33.1_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 32772 9be1ca64481cc83b8b5915bbd04e70af\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.33.1-7ubuntu1.1_amd64.deb\r\n Size/MD5: 468212 2496548c34520e373ae8cf63b577d224\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dbg_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 10136378 37c30dbd6c094436b25bbfeb7e3541b0\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 1661244 733a3d063a4ad8c16e6e117ca8505c3c\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 138894 cb2b96f865593ecab817e2f45c76f9b2\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.33.1_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 179868 d8f20531abd75d8e923bc822a0d16ac6\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 189112 91e9aa24e04ef04123244bb5055c2c41\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 180970 d44e0a94b1a3b58aaf13c4550cff3750\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.33.1_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 53758 40d833c7ee0cd2ceafffb1d739c0aa3e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 76948 894ddddf969a55990694766690e2c766\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.33.1_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 67836 b9ce512465c3813aaca082ffe91d9227\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 1014080 a527ff2d24e34bbaef781a3c598c1fe8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.33.1_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 457488 3972fab4bcef47caa1d21dd077931858\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 103890 10de5127a14f67238ca21a2e0170188b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.33.1_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 28450 7634a71c0ce5d9dbfd15854d5b2836fd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 264994 e515f78c283cd9fc88fec1be48bf3c89\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.33.1_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 187122 309231cf2451e36276b8335f90868f81\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 1055012 be1eb9d24db03f7598f4cfd0d10ecdde\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.33.1_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 536804 ed5b8d570479d5965d50d9744c42e0dc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 628388 378b0d92b91978360e15c9f482177325\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 84432 182f0a278549f6f7530bcdcac05e6618\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.33.1_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 63648 35fcd2ee249c8ca28e133cf92e1fd2bc\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 534202 e2c812474bacabfe528182f520f404e1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.33.1_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 319960 a543dfefa241d08d401c67b8235fc4f9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 40292 6d1acc110bd182f5dc617fba106ae181\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.33.1_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 32050 3b13add518de4bdf1e605372ff4f95e5\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.33.1-7ubuntu1.1_i386.deb\r\n Size/MD5: 449250 f9ff43476e532429b53fd5b36724f0ee\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dbg_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 10209766 300f9dbd3edf263b572028aabfb27a3a\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 1661216 6cc58c42eeb93ea7e92e0a3a3cd0a8db\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 138898 bde98d41004075e3bd9b3282d942c362\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.33.1_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 188692 a4c5c0acb5a12bd48409e0147a124ac3\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 192066 8a4021edd529ca6f3901a21eb93939a6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 185920 0f7de31106e5b3df0cdd970b4ea35271\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.33.1_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 57488 2553d0f7bad44b76df821f7baa0cf5dc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 85646 4e8dd8e6f8fd301f87f15bf81fb296e1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.33.1_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 71796 14197fffec7465ed9d8d177b692b550e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 1081068 186c643ef1979d8c198334511620a469\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.33.1_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 414064 793d8d47d07e17c0ea2a753a6575c8aa\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 103892 cd9072b1ef769b71549b3f51d729c7a0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.33.1_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 29856 d2deaf27e45f75f52055c8a6329af7bf\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 291978 e645eb47236e631e2e93f34c3de770c1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.33.1_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 188334 5643b807cfafbc7e1a995c7daecf3eab\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 1160298 46621f007f169eaba6c3f5c843267b1c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.33.1_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 531608 3e1729e6fe142fe5ba1d14f8b1a81018\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 702454 c268a290478fb453df2c0b86dd6bbd1e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 91160 ca1d00cab9ce48ee252be9a059093c49\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.33.1_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 66518 993a352ad0279e7ef9efaf6d942c889a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 602222 9c98d5a427985bdf4a824c1365ac0eb2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.33.1_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 342384 b6e3d763d51b9d9ee4da05e5a856ec15\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 42712 693412770be95171a8b35097fd854d1b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.33.1_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 33482 318a3019181cae6604065c5dc4c507fa\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.33.1-7ubuntu1.1_powerpc.deb\r\n Size/MD5: 471038 c08a2fa9a2d99b13ad2502d1efa63ef3\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dbg_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 10275742 f6de6602dc411d5c70860f3baf81e761\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 1661278 217921c12a2edb3e2b8cfabd54f7c439\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 138898 c6815b8bb0262e7d896935d74236ae70\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.33.1_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 178894 522c59daf63ae091f930854e66b9eb62\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 398788 fda0cae52610c78df265d2361ba9e91c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 178330 b4c73decaf179bef378afd63f042d9c7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.33.1_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 53504 1537a1fe6ab2d75885a3e22b5776512f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 78844 9495dbb1cbba86841aa16ad35e5b2d2f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.33.1_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 66870 2244fe825c19f3dadd4f54e8cc0b487a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 958892 8e199ddac6c30196b79176aa394907ed\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.33.1_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 446286 ee4f16dd256c09fcab335d8727696249\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 103892 fcaaa13d70e814e399db6f95f8b5a1b7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.33.1_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 27960 a1c694a3806a2113e49a941c0f5d8bda\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 264910 a869214c701a119d0511edbbd6eb6744\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.33.1_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 190774 210b7ad10247450cd700d9baf554b918\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 1008652 35ddf89aa68e3f4a1f10a0bc69531fb2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.33.1_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 705682 b397c6a4a99fefa9ca454e2b7f0b34b1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 596082 ac89d8b0fb1d0f65a854111132a9a9f6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 82208 6c764c8d901e678f351814517eb8c215\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.33.1_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 60596 e13ce2e3b6b31a005504d22204e464b3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 531310 6f8696fc3c2f24014251e508e56afb7b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.33.1_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 317618 40088d4ca09bbcff86b7ea7025ab0c80\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 39954 663dc88c080be97d82049e7ea0af95a5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.33.1_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 30656 405c14871db095398e419d1cf3c4bf2c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.33.1-7ubuntu1.1_sparc.deb\r\n Size/MD5: 429502 f58a5c001d187ed59499a821ef8d8fac\r\n\r\nUpdated packages for Ubuntu 7.04:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/boost_1.33.1-9ubuntu3.1.diff.gz\r\n Size/MD5: 64131 dae3fa83e51844b999bb26c1332cf5a2\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/boost_1.33.1-9ubuntu3.1.dsc\r\n Size/MD5: 1517 8fac0b0b6097d1f9b99509e65a46ca08\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/boost_1.33.1.orig.tar.gz\r\n Size/MD5: 14358143 a0be7261bfdc8a6c98a25f964766c7a5\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-doc_1.33.1-9ubuntu3.1_all.deb\r\n Size/MD5: 8297564 0caca94e528614e535a78215238d1528\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/pyste_1.33.1-9ubuntu3.1_all.deb\r\n Size/MD5: 48172 3b7ca48d4419a9688f6dab81e9f7e3aa\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dbg_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 10589812 3aed7df9c299fcfd3fdfe0bc3bd6581d\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 1661594 ea281b56d915c08129fe4ca2af4414e2\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 139204 e83a82737ee694e10dc670b0954bbe2e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.33.1_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 192432 f1196cc4942a8e4b7a7fa58278288ad9\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 191614 25e621317a17cec53e4f28079cc70c3f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 186942 f26a4485925c6c8bf4cd3d8e2232e4fc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.33.1_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 57378 0b3c6c6197bd1bbd17361d8be7991cfa\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 87334 9f6256dbd8ace13303c47565dfaeafa3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.33.1_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 72184 b8228600e69aaf594e4417a7c4c859d3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 1080528 0d1381d494814e3cfc33e32d1513739c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.33.1_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 521008 a910cb0e45205711b725dd06a4928cc7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 104182 664b049c54f2869be6f1e6ab20aee9b5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.33.1_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 29692 e1fe8ab680dcc02db047cad186c858ea\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 285188 b0a52ec195fc4d55ba42b6f91ac244a1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.33.1_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 190926 ae78f14a7b81eebf05b493ef98b30aaa\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 1086838 8c5ef8a180e5670313d4e07735bd46a5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.33.1_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 534816 ab720889f0ccf9c46b833a2da7efb82c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 681440 5e6a4cbfdf7b3aa9c7c46cf6f8e55fcf\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 91938 78b5a7c2cddf6facdf9bf591ee425054\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.33.1_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 66222 e7b15d7d1d14f4a0d0c0aa94ed7f3802\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 592028 4f64e7733dc58481eb647d87f1e24305\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.33.1_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 338198 1f64988a7dbc00cb78b6c3cc773d30ae\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 43078 980e1a26a8d207ac633462fa2402c10d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.33.1_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 34216 aca9934c441a5e561c3befdef5ab285e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.33.1-9ubuntu3.1_amd64.deb\r\n Size/MD5: 470386 5a8ba321272007c9fde728b091aa1bc5\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dbg_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 10343662 fcfe349f8f85972391dcedb9ee85b408\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 1661538 8dcdad0e1dc5bd92d43528f4193d70ca\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 139202 de7b37cc1fd8b76cc2690ef87a30ba56\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.33.1_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 187994 e3a469aca9f249699f5e3c477c6fa0d1\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 189124 fd0d405582379b3936e3bd56f0c91bef\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 181446 15c864fcfc18b12c700703ecd166846f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.33.1_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 54204 313909f977a880deec0bae03695fc75e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 77188 c9b7840e72d93d70963cf2bbcb443b5f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.33.1_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 69308 f4c4d8647d901075f44514d495f8cb7a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 1014272 25a462093dfb30ca3e615beb015295ac\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.33.1_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 501024 d35b6780a59878ed0cacbeb824f5d7e4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 104176 f26f011bf81d2c1a37f8cd2eeb1f03b6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.33.1_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 29574 2529e96098de4378a4454400a04dccd5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 266720 3950146637256578be95ab6f3a9becfb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.33.1_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 188958 43002fd6ba77b98f523035cfae9255ea\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 1055088 a044e24f12ec4d94d457a296614ebfab\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.33.1_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 542548 7303fd2daee4e943d1a04aafea11e948\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 627698 141648792cf2636ebba93b312c13f03d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 85626 ff344bfcc48c0ad01e55d70be225eee3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.33.1_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 68154 547b2789d6c53d82e8f97f50d049450f\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 532024 19e3040db3c0debd67589b8e57dab10c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.33.1_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 329234 acd6131331a797c258da7bdff072d50d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 40458 d5b97eebf9172029dbfe47109f57b3ca\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.33.1_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 34412 aa5b7f4666598fc8b2276a3e6f9bdcdc\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.33.1-9ubuntu3.1_i386.deb\r\n Size/MD5: 452998 6e17f755c26072ee3d02c1b9141ce1d4\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dbg_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 10818202 2491bf2eee2e101b74d43f9ec07a408e\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 1661508 3e8e564b006151199a51c669c4c59d4b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 139204 591f40eb84b09c615d877d5c37159830\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.33.1_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 206458 67288ce650533344d28b3fe1616a2084\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 194946 a32e6b495130528a95900e8b6b577b35\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 186100 b19dfe7145571fdc184cfcbf2e593ea5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.33.1_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 60758 4937b3675fd91005e89b718e56a1235e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 85406 9b131cdb809fc7deed2d129ac3f84fe3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.33.1_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 76276 646db66b0d4b0109860d189045b243a4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 1081266 9ffdb7abe213e82e8b35c3ed477591a5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.33.1_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 519904 0b55408e9836c377b0ba70ed17d27436\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 104182 ee6ef34d7a9ef609eebcc15c403f6521\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.33.1_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 32406 669b826db7f61984b8b83825ff59f892\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 289814 139e528a1aebe306e76d44c2dc3ad9c5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.33.1_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 197952 93d420b919da14c70dbaf535eb06f227\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 1159816 39fcb673943a9845604afe9f597c5985\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.33.1_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 556996 2c562d7329036477adaffc680ea10d1c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 700110 7531f935c5cc724633bb11b1e8b691b5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 92228 e533a945b96d0b7121968a11f3635a66\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.33.1_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 74632 b1da79b6de240878e4ee855a5487c3fb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 606578 fd758cca853fdf431a73a1f9ff714b97\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.33.1_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 366454 91e307512611f043c34eadb9cf353931\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 42848 548deddd455d6df0c0dcb3090316b7d5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.33.1_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 37812 af36ddd5b05beba19821433b78eddc07\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.33.1-9ubuntu3.1_powerpc.deb\r\n Size/MD5: 472894 27b32cd434e32961b47e6a6d32dbeb0c\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dbg_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 10549818 2288476ed8eb3c8ff2969b4f875ee40b\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 1661556 4c0e1ee77575aa2771c46378592cb555\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 139210 2cea38790f7346ed86c01603b3412946\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.33.1_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 188002 467a0b7b00485406385cee22a6f9a8d3\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 396640 46c048d08525d6f6840ed9a365e084b3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 178408 814573313731ef0f532d8ec233d38a66\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.33.1_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 53918 6f3b973d50c9e7f570f1fc5692deea8a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 79312 b0e16d3b2ce376531ebf4844afc02ee4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.33.1_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 67910 b67c520945d8fc8880cdf509d2ededfe\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 958928 e3ebcb108b1bb5133627e5486aa94f05\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.33.1_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 490336 0f4d5e63771ef2741f6f85ec9903bafd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 104184 4e0d43b93bf176fcef156b0f9668215f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.33.1_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 29100 33afa69df92ed248070262c7166fdff6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 266986 05ab629705e3d66d2b76ac752d9b33f7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.33.1_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 195028 3aaf74ea2c0e06b33e0df0f73a4d4e11\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 1007582 82244ea9a4af3973a99930ae5be845d1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.33.1_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 712408 66b69d5ec2fe9cf7444c46706272d362\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 596914 8fe80f67cba0d5602c0f2df6baa9ff35\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 83148 6dc7ba09a71fd72a45f3535786b8574e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.33.1_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 65100 08f7ed0d7a552f54862da5841a11a9d2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 530998 81762a89f030324f363b691b3e4e01f3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.33.1_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 334146 2611f439fc3d50fdcc8c6fe004b0b1dd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 40120 54c405b259e3a01aa67640fe4ecd943d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.33.1_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 32838 e3634814277225db2707c6c0dc7e7288\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.33.1-9ubuntu3.1_sparc.deb\r\n Size/MD5: 432962 51fe24663a22f9b0bcc7fdf8343f81ef\r\n\r\nUpdated packages for Ubuntu 7.10:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/boost_1.34.1-2ubuntu1.1.diff.gz\r\n Size/MD5: 55670 4491e0528e4146a397bd421a39fd503a\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/boost_1.34.1-2ubuntu1.1.dsc\r\n Size/MD5: 1592 261235a51b292d7fa19dbbc355a82d15\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/boost_1.34.1.orig.tar.gz\r\n Size/MD5: 16017741 5290a2a565d7d15a31bb1136a7c308d7\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-doc_1.34.1-2ubuntu1.1_all.deb\r\n Size/MD5: 9268976 ce191d8dafd6209ef7f5870cf4547f12\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/pyste_1.34.1-2ubuntu1.1_all.deb\r\n Size/MD5: 50002 53dab0aa1fcc180499bc2265ebc75882\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dbg_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 49057246 4bd9f4747a724592a1059d07ebb95df7\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 1932138 974ae214c21d8e6a00c3b6dc2b3b8a94\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 400320 4653ad2de8b140df75c2aa0540555fd5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.34.1_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 204032 1281046cd24052fc061fba90cd466a27\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 188012 d44458e19b443b179df37ba113e3ddd7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 188224 875ce5b04b9fde720e3a38491e1e43c6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.34.1_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 60226 545296bb5864fc17ab35ad49d28fab37\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 86306 87f6ec9999fb2fe2054e39f5d1efa462\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.34.1_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 56758 1e232e672170f4b11d192bc88474eaf8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 516150 d2d17594ba0257b673b583a54e668c69\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.34.1_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 244618 54c3553e992853582ad63f3320fbec30\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 130886 780d5069b892c2501bece27f2eb8fad5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.34.1_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 45310 2eadc329386b58cecbfb7538172775be\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 293728 5d42a9c6f59322b38b1b18b8ad051b75\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.34.1_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 195490 d7b695a8ac989cbf82388b4437c2bb5f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 1086384 e1b7418796bb5d003f065703a9d23f06\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.34.1_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 536830 bbaf8d580b66ec918a3c2f1b83efb388\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 678060 60284b235b60a03af8a11257ebb0e303\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization1.34.1_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 416584 6da36f41c1bb3e488a6fb7ed8764f9e3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 93966 5e4c78198847cda00668150222da9e1f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.34.1_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 67742 7470aae181af7939a130381589eeb014\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 497700 b5497c0372a65328311097649ae2cfac\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.34.1_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 240812 9cd196b4bd8c9b557f1ba63743720172\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 48794 3a4fa843f98ebac3dc30068bb82467db\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.34.1_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 36750 5d770873016d0609a39e04f8bb7e8c9d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 864718 87e6048b0f866820215e99531b77d832\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave1.34.1_1.34.1-2ubuntu1.1_amd64.deb\r\n Size/MD5: 475418 3d18d9fefe3a58f83bb5177437c84543\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dbg_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 46121532 fa5f65c30c7c224d6fc36d3e306cb486\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 1932116 e2ae44384c0e694d4ad00eb99263f551\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 368768 7aea0a4aab68954129b6c3a1e7891163\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.34.1_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 199602 79ebb94f955d8b8285d3b5ba6f4264d2\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 185948 3d9e64ee73771261ecc6fe92c3bb1718\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 182014 4d9afd936c89a0fb55419c215f87259d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.34.1_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 56790 0ecf7a773aec14a63e1b7c7169a72c22\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 80496 6ab9c58755a6c38a08ebae01a00eb6eb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.34.1_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 55748 af18cb3ff2c37dc284b0d55911315b40\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 508518 243730fdbee0b15d3bc89fecaf7805d7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.34.1_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 252322 4b8e0af58b29e5ca78b3b97da8cda8ed\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 128294 9b5a280f524e5ee1f75c753820da24dd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.34.1_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 45066 b9415e35d293f5f28d340cb5fb63d34e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 271540 ae172751ff63285aa2738b3922868349\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.34.1_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 190290 07abe1bcceda1d441dd0d90d35473cd7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 1062616 1fa23b87ef857912368001c96b0af6b6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.34.1_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 550924 6f48b8b7fb37c1f5b95d3103e9fddf22\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 622362 869db3023d37a8d76375c41b6c4a1948\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization1.34.1_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 415554 82f3f498024e3ad8372ae8eb5fb3edfb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 87640 4985992475e3109e5836213f43a810bb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.34.1_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 69724 ea127e805b17bfc616794c6860bc8304\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 455970 cd94581d360e309a2163ebbbfe0a4bf1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.34.1_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 235016 0e3c51abd634ee758ce73373dfaca398\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 46036 b67f573048cb3fb8ebe7c6ccf8f75414\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.34.1_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 37000 6a02ddcea0b9bb305bfe5ca9311d223a\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 829808 72368f472d2a084088f6ab1c3b726327\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave1.34.1_1.34.1-2ubuntu1.1_i386.deb\r\n Size/MD5: 468098 49b06e70d203e7fc4fedf61417f3e972\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dbg_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 50261012 0902ca7c9d026d731b858c1d35d7c8c7\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 1932030 059a1bb2d5db8d3cf10c764b99961701\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 411408 839c4d0c59f0346e6d8569957a9e2e55\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.34.1_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 221442 3ed32b91f984d3b189cb3d5a009838af\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 195642 88add23894912c9988a5af0cd5dde104\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 188356 102877aef3f1bb2782097c7c063e799c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.34.1_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 63530 c7a813b525506b8bb0b1d28c3c8e63cb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 86210 d42aa06af46e60a9bba3023938407f33\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.34.1_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 62672 114c4664a407d02778a6ccfbdd1e3ecd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 514920 54fbaff32c7835f5c03b09b1838bd435\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.34.1_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 248890 d63cf6e612113b7b7ae81718e69d5c1d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 131652 ac9f0a7d2e893ea1bf428dea4e68ebc7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.34.1_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 50712 cd43d173aa4251c2456fb508661ff238\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 296108 eb2ad6f8b914040efb6607de0ad5a3db\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.34.1_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 199778 3e331c543fd2c1ac1207d8a0c61d87df\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 1166730 ce872a01333d150ae5c5ba43f7930a1e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.34.1_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 565122 d2dadf9194ad3def639e0748810a030f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 684288 2a6122725c8df93796cd9150ad61bd9f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization1.34.1_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 438798 02c8e22f0d68c173b1197ef6e9adbb17\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 93996 ba75222ad0405a85997468ba3bd66fb2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.34.1_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 75770 be19fa8eaba576634903f3b2bf369455\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 507750 6496b9336427f6a005d1e0c5aecc242d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.34.1_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 257596 5e0ed00900fbd6d8be8b8995d82e014a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 48670 edfc194d0ef34587d3975479dfcd32c4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.34.1_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 40308 38adff6fae6690351da1773c03040cc5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 878204 9450fd924fc4e5fd8b0db55e3ae1a91b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave1.34.1_1.34.1-2ubuntu1.1_powerpc.deb\r\n Size/MD5: 470872 45220ab990cd3fd0b571906a5a5489cb\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dbg_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 47092868 87cd084aa3a226da01bffb798c9e10db\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-dev_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 1932106 16cb89d608868a748b3bd87538a032ae\r\n http://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python-dev_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 370082 4563a87a591c38518f6dea4372368c1d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/b/boost/libboost-python1.34.1_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 200304 e4b6a4850b8485a0d56028c216e17480\r\n http://security.ubuntu.com/ubuntu/pool/universe/b/boost/bcp_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 407336 984711586fcf057471a53aea40d3c290\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time-dev_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 179968 c26eff4767384e9be696b0c168702ba4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-date-time1.34.1_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 56332 8fd7f213ffeb1ac0b1358086d3a990e6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem-dev_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 81052 d4bb699ddffa4dda20cc61917825001d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-filesystem1.34.1_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 55666 023011484a616e9cbe64c428f17af2c8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph-dev_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 480864 1bc3fe36ef6300a3fe940f5a97b1a5bc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-graph1.34.1_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 229344 808c3e15bf42ba3d69c5a77bde297d7f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams-dev_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 128958 79ec8682a4c90961851aa3cb67ab7617\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-iostreams1.34.1_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 43806 55d735a33cb0bdcd2d34dfc2e0023fef\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options-dev_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 268894 37834e243c9f0bfbe67413461952a579\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-program-options1.34.1_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 198300 33c9db76c28f083bf6ec16c88986e129\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex-dev_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 1010968 6c366030ed27b9e4d073652b651f158d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-regex1.34.1_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 718958 0fe0f010d3994fdfd4e9359f3980a2c8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization-dev_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 588308 9a1a1105db356868814c07e7ca61973f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-serialization1.34.1_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 416676 10d9255333ea61583f68a1ecdfc99196\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals-dev_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 85080 f5e65c313f1fafd048dfe3c00ecfd503\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-signals1.34.1_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 66528 4ba5eeacb9bda9dc76951081201507c0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test-dev_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 449224 dbae5ae2b2f54602f6d00420d0ba660d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-test1.34.1_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 238206 3b944a0636a0afb575c1de68e75f8ff3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread-dev_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 45700 7561ebf2cf982d4a498f06edb4a283fc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-thread1.34.1_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 35116 e5593da77ed1f4bf025fe102f8d70701\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave-dev_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 791216 062faf0f512007d09035dbd9ce06693a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/b/boost/libboost-wave1.34.1_1.34.1-2ubuntu1.1_sparc.deb\r\n Size/MD5: 485210 d7fdf1d988cf3ae7ca4542d3ac5d12b2\r\n\r\n", "edition": 1, "modified": "2008-01-17T00:00:00", "published": "2008-01-17T00:00:00", "id": "SECURITYVULNS:DOC:18894", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:18894", "title": "[USN-570-1] boost vulnerabilities", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:28", "bulletinFamily": "software", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "Insufficient regular expression validation.", "edition": 1, "modified": "2008-01-17T00:00:00", "published": "2008-01-17T00:00:00", "id": "SECURITYVULNS:VULN:8582", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:8582", "title": "boost library DoS", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "Boost provides free peer-reviewed portable C++ source libraries. The emphasis is on libraries which work well with the C++ Standard Library, in the hopes of establishing \"existing practice\" for extensions and providing reference implementations so that the Boost libraries are suitable for eventual standardization. (Some of the libraries have already been proposed for inclusion in the C++ Standards Committee's upcoming C++ Standard Library Technical Report.) ", "modified": "2008-01-22T15:57:59", "published": "2008-01-22T15:57:59", "id": "FEDORA:M0MFVLA0032398", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 7 Update: boost-1.33.1-15.fc7", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "Boost provides free peer-reviewed portable C++ source libraries. The emphasis is on libraries which work well with the C++ Standard Library, in the hopes of establishing \"existing practice\" for extensions and providing reference implementations so that the Boost libraries are suitable for eventual standardization. (Some of the libraries have already been proposed for inclusion in the C++ Standards Committee's upcoming C++ Standard Library Technical Report.) ", "modified": "2008-03-13T07:49:35", "published": "2008-03-13T07:49:35", "id": "FEDORA:M2D7QWWM019059", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 8 Update: boost-1.34.1-7.fc8", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "ubuntu": [{"lastseen": "2020-07-09T00:24:49", "bulletinFamily": "unix", "cvelist": ["CVE-2008-0171", "CVE-2008-0172"], "description": "Will Drewry and Tavis Ormandy discovered that the boost library \ndid not properly perform input validation on regular expressions. \nAn attacker could send a specially crafted regular expression to \nan application linked against boost and cause a denial of service \nvia application crash.", "edition": 5, "modified": "2008-01-16T00:00:00", "published": "2008-01-16T00:00:00", "id": "USN-570-1", "href": "https://ubuntu.com/security/notices/USN-570-1", "title": "boost vulnerabilities", "type": "ubuntu", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}]}