Skip to navigation

Bug Fix Advisory boost bug fix update

Advisory: RHBA-2011:1246-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-09-01
Last updated on: 2011-09-01
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated boost packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

The boost packages provide free peer-reviewed portable C++ source libraries with
emphasis on libraries which work well with the C++ Standard Library.

This update fixes the following bug:

* An application compiled against the boost package version prior to
1.33.1-10.el5_7.2, and run with this exact version installed, could be killed by
a SIGSEGV signal due to mismatch in the application binary interface (ABI) of
the regular expression library. That failure could only be fixed by recompiling
the application. This updated package rectifies the ABI changes in
aforementioned version of the boost package.

Important: any client application which was recompiled against boost version
1.33.1-10.el5_7.2 should be recompiled against this updated package to ensure a
stable ABI and avoid any potential incompatibility. (BZ#727895)

Users of boost are advised to upgrade to these updated packages, which fix this
bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
boost-1.33.1-10.el5_7.3.src.rpm
File outdated by:  RHSA-2013:0668
    MD5: 2bd6c27f865e13f54d032dba33cc5e0c
SHA-256: 60813afbd285d228d1de4fae4090e83a8f5398363756b46095f7c8a664dd98b0
 
IA-32:
boost-devel-1.33.1-10.el5_7.3.i386.rpm
File outdated by:  RHSA-2013:0668
    MD5: 0d6aeaf11decdb3e41f59b019151c22b
SHA-256: dcd6559267e51660c4f83be47be82fadd4dc1a65a6feffc3f459bc78b9cb2676
 
x86_64:
boost-devel-1.33.1-10.el5_7.3.i386.rpm
File outdated by:  RHSA-2013:0668
    MD5: 0d6aeaf11decdb3e41f59b019151c22b
SHA-256: dcd6559267e51660c4f83be47be82fadd4dc1a65a6feffc3f459bc78b9cb2676
boost-devel-1.33.1-10.el5_7.3.x86_64.rpm
File outdated by:  RHSA-2013:0668
    MD5: 9780f8e4cd9a4fd71a40df9f261d8d2e
SHA-256: f45859962c16d99ca04c1411813df41cef03f6a3f9cc382d2dab5b96b1a63387
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
boost-1.33.1-10.el5_7.3.src.rpm
File outdated by:  RHSA-2013:0668
    MD5: 2bd6c27f865e13f54d032dba33cc5e0c
SHA-256: 60813afbd285d228d1de4fae4090e83a8f5398363756b46095f7c8a664dd98b0
 
IA-32:
boost-1.33.1-10.el5_7.3.i386.rpm
File outdated by:  RHSA-2013:0668
    MD5: 605943d2cdc3cd96f679de70c6aef23c
SHA-256: 32295bb90facd0df18551cb5b0f3915768c1ff39e3b67267f7cf7716a2ff915f
boost-devel-1.33.1-10.el5_7.3.i386.rpm
File outdated by:  RHSA-2013:0668
    MD5: 0d6aeaf11decdb3e41f59b019151c22b
SHA-256: dcd6559267e51660c4f83be47be82fadd4dc1a65a6feffc3f459bc78b9cb2676
boost-doc-1.33.1-10.el5_7.3.i386.rpm
File outdated by:  RHSA-2013:0668
    MD5: e5c0842899a1720d45a1e892187c46ad
SHA-256: 57df47310df81e84e17a73b3dddc3802826d011781e79953bdb4e06e7050b761
 
IA-64:
boost-1.33.1-10.el5_7.3.ia64.rpm
File outdated by:  RHSA-2013:0668
    MD5: 27ee702ec903c93555bb91124782155a
SHA-256: 229e3e51ff44cd94e835caf1424d5b9029a3688cb772316a3cb97e6e36827dc0
boost-devel-1.33.1-10.el5_7.3.ia64.rpm
File outdated by:  RHSA-2013:0668
    MD5: e6c8c8472b859c1a36737c20edc54ce0
SHA-256: d519f8aeca89f68df120d2a78bc050fe22bc096479b4b6698e4b72b8b5af8775
boost-doc-1.33.1-10.el5_7.3.ia64.rpm
File outdated by:  RHSA-2013:0668
    MD5: 97c04be8367d87ed0af0c2e558defb17
SHA-256: bcbe08346d0b3c8f00adb037851373fb60ec8a51d09e98ac679f77f3f12de048
 
PPC:
boost-1.33.1-10.el5_7.3.ppc.rpm
File outdated by:  RHSA-2013:0668
    MD5: 305eee1589447b274abf713250680563
SHA-256: 100668f485a2dd57c4c7e2862f3b3fa3c6bdff0282c0c7212bdf7d4d90bd3a0d
boost-1.33.1-10.el5_7.3.ppc64.rpm
File outdated by:  RHSA-2013:0668
    MD5: eb0d44c95645645829e8422a9344eabe
SHA-256: 7960e9e9da398371bd928cd0a4be32690b20588040c32b3cf685a35913586085
boost-devel-1.33.1-10.el5_7.3.ppc.rpm
File outdated by:  RHSA-2013:0668
    MD5: 8329689c52c5e7468f30b1d8c05eb685
SHA-256: 29b35f6a96b05e459bc60e55564b2baa9d1ee2a5e8bf87121dcfcfc03aca391e
boost-devel-1.33.1-10.el5_7.3.ppc64.rpm
File outdated by:  RHSA-2013:0668
    MD5: 6b3fb49e3176b84d01917d0bb61b04f4
SHA-256: 41aa72ac96850c1b2dd54cee02e4067bbd87731a1661bea079d2e949c83854a2
boost-doc-1.33.1-10.el5_7.3.ppc.rpm
File outdated by:  RHSA-2013:0668
    MD5: 8ccbab1c141eacdaa6709aa2fb9f9562
SHA-256: f5b3a4bb3ccbeff9159e0fcc47bdaa09e31c1c8e5a5120f6aafd2c2d909f30d0
 
s390x:
boost-1.33.1-10.el5_7.3.s390.rpm
File outdated by:  RHSA-2013:0668
    MD5: 9c05e0d2b8f6ee9607ca9c030b14179b
SHA-256: afab6bbe18bf60c6d189185447825cc59e292eb85b25489bf25d0ad30e238802
boost-1.33.1-10.el5_7.3.s390x.rpm
File outdated by:  RHSA-2013:0668
    MD5: 73b01de704de80f0fd09307d6711a43d
SHA-256: 577de7c018fd82c7b4cd4f9e551d23d701f76a6fae1f47b1c6c64518dfef47f4
boost-devel-1.33.1-10.el5_7.3.s390.rpm
File outdated by:  RHSA-2013:0668
    MD5: 241a13bfa0057b98878ace8b076e9123
SHA-256: ed2463da3601a263e399e909c132bd15bc09991ad3be756d9e99706f7986d0f1
boost-devel-1.33.1-10.el5_7.3.s390x.rpm
File outdated by:  RHSA-2013:0668
    MD5: 9f402f5b1446caeb06e75895a71344f7
SHA-256: b7a688b4f68a063352ee42a0416097a302a5be420ed9823026cb5c3b917e389c
boost-doc-1.33.1-10.el5_7.3.s390x.rpm
File outdated by:  RHSA-2013:0668
    MD5: c0a9381c62349c3642a964876cf91468
SHA-256: cf1f5a842cb7be9f647ccf8dd327e6a0af863ded053a83762ea8998afd5ceabb
 
x86_64:
boost-1.33.1-10.el5_7.3.i386.rpm
File outdated by:  RHSA-2013:0668
    MD5: 605943d2cdc3cd96f679de70c6aef23c
SHA-256: 32295bb90facd0df18551cb5b0f3915768c1ff39e3b67267f7cf7716a2ff915f
boost-1.33.1-10.el5_7.3.x86_64.rpm
File outdated by:  RHSA-2013:0668
    MD5: 57406e659b0a8e247acaf3ef18b83aeb
SHA-256: 88c8695724d293b17d6126e6824c1a50ded17dc1e67d61546d323ed8bb582c41
boost-devel-1.33.1-10.el5_7.3.i386.rpm
File outdated by:  RHSA-2013:0668
    MD5: 0d6aeaf11decdb3e41f59b019151c22b
SHA-256: dcd6559267e51660c4f83be47be82fadd4dc1a65a6feffc3f459bc78b9cb2676
boost-devel-1.33.1-10.el5_7.3.x86_64.rpm
File outdated by:  RHSA-2013:0668
    MD5: 9780f8e4cd9a4fd71a40df9f261d8d2e
SHA-256: f45859962c16d99ca04c1411813df41cef03f6a3f9cc382d2dab5b96b1a63387
boost-doc-1.33.1-10.el5_7.3.x86_64.rpm
File outdated by:  RHSA-2013:0668
    MD5: bc5793bd8de9e67530a03f7054134232
SHA-256: 3b14e7351f68de9cbbc76cdfd890f2caecbf795cf15138aa1f059fded5d92f92
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
boost-1.33.1-10.el5_7.3.src.rpm
File outdated by:  RHSA-2013:0668
    MD5: 2bd6c27f865e13f54d032dba33cc5e0c
SHA-256: 60813afbd285d228d1de4fae4090e83a8f5398363756b46095f7c8a664dd98b0
 
IA-32:
boost-1.33.1-10.el5_7.3.i386.rpm
File outdated by:  RHSA-2013:0668
    MD5: 605943d2cdc3cd96f679de70c6aef23c
SHA-256: 32295bb90facd0df18551cb5b0f3915768c1ff39e3b67267f7cf7716a2ff915f
boost-doc-1.33.1-10.el5_7.3.i386.rpm
File outdated by:  RHSA-2013:0668
    MD5: e5c0842899a1720d45a1e892187c46ad
SHA-256: 57df47310df81e84e17a73b3dddc3802826d011781e79953bdb4e06e7050b761
 
x86_64:
boost-1.33.1-10.el5_7.3.i386.rpm
File outdated by:  RHSA-2013:0668
    MD5: 605943d2cdc3cd96f679de70c6aef23c
SHA-256: 32295bb90facd0df18551cb5b0f3915768c1ff39e3b67267f7cf7716a2ff915f
boost-1.33.1-10.el5_7.3.x86_64.rpm
File outdated by:  RHSA-2013:0668
    MD5: 57406e659b0a8e247acaf3ef18b83aeb
SHA-256: 88c8695724d293b17d6126e6824c1a50ded17dc1e67d61546d323ed8bb582c41
boost-doc-1.33.1-10.el5_7.3.x86_64.rpm
File outdated by:  RHSA-2013:0668
    MD5: bc5793bd8de9e67530a03f7054134232
SHA-256: 3b14e7351f68de9cbbc76cdfd890f2caecbf795cf15138aa1f059fded5d92f92
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

733235 - Fix for 727895 caused an ABI regression


Keywords

abi, boost, regexp, sigsegv


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/