Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pool | Boost | * | 1.0.0 (including) |
Pool | Boost | 2.0.0 (including) | 2.0.0 (including) |
Red Hat Enterprise Linux 5 | RedHat | boost-0:1.33.1-16.el5_9 | * |
Red Hat Enterprise Linux 6 | RedHat | boost-0:1.41.0-15.el6_4 | * |
Boost | Ubuntu | hardy | * |
Boost1.40 | Ubuntu | lucid | * |
Boost1.42 | Ubuntu | natty | * |
Boost1.42 | Ubuntu | oneiric | * |
Boost1.46 | Ubuntu | oneiric | * |
Boost1.46 | Ubuntu | precise | * |
Boost1.46 | Ubuntu | precise/esm | * |
Boost1.48 | Ubuntu | precise | * |
Boost1.49 | Ubuntu | upstream | * |
Boost1.50 | Ubuntu | quantal | * |