boost is vulnerable to denial of service. Invalid pointer dereference flaws were found in the way the Boost regular expression library processed certain, invalid expressions. An attacker able to make an application using the Boost library process a specially-crafted regular expression could cause that application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.
bugs.gentoo.org/show_bug.cgi?id=205955
lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html
secunia.com/advisories/28511
secunia.com/advisories/28527
secunia.com/advisories/28545
secunia.com/advisories/28705
secunia.com/advisories/28860
secunia.com/advisories/28943
secunia.com/advisories/29323
secunia.com/advisories/48099
svn.boost.org/trac/boost/changeset/42674
svn.boost.org/trac/boost/changeset/42745
wiki.rpath.com/Advisories:rPSA-2008-0063
www.gentoo.org/security/en/glsa/glsa-200802-08.xml
www.mandriva.com/en/security/advisories?name=MDVSA-2008:032
www.securityfocus.com/archive/1/488102/100/0/threaded
www.securityfocus.com/bid/27325
www.ubuntu.com/usn/usn-570-1
www.vupen.com/english/advisories/2008/0249
access.redhat.com/errata/RHSA-2012:0305
access.redhat.com/security/updates/classification/#low
issues.rpath.com/browse/RPL-2143
www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html