CVE-2013-0252
Publication date 5 February 2013
Last updated 24 July 2024
Ubuntu priority
boost::locale::utf::utf_traits in the Boost.Locale library in Boost 1.48 through 1.52 does not properly detect certain invalid UTF-8 sequences, which might allow remote attackers to bypass input validation protection mechanisms via crafted trailing bytes.
Status
Package | Ubuntu Release | Status |
---|---|---|
boost1.40 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
boost1.42 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
boost1.48 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
boost1.49 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
boost1.50 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
Notes
Patch details
Package | Patch details |
---|---|
boost1.49 |
References
Related Ubuntu Security Notices (USN)
- USN-1727-1
- Boost vulnerability
- 18 February 2013