Re: [Boost-bugs] [Boost C++ Libraries] #6528: Potential vulnerability in programs recompiled for 64-bit platforms

Subject: Re: [Boost-bugs] [Boost C++ Libraries] #6528: Potential vulnerability in programs recompiled for 64-bit platforms
From: Boost C++ Libraries (noreply_at_[hidden])
Date: 2012-02-08 13:23:21


#6528: Potential vulnerability in programs recompiled for 64-bit platforms
-------------------------------------+--------------------------------------
  Reporter: econometrics@… | Owner: jsiek
      Type: Bugs | Status: new
 Milestone: To Be Determined | Component: dynamic_bitset
   Version: Boost 1.38.0 | Severity: Problem
Resolution: | Keywords: Vulnerability, 64-bit, overflow
-------------------------------------+--------------------------------------

Comment (by anonymous):

 Replying to [comment:3 Ulrich Eckhardt <ulrich.eckhardt@…>]:
> What exactly are you doing? What code is vulnerable to buffer overflows?
 I have solved the problem by explicit usage of {{{dynamic_bitset<unsigned
 int>}}} instead of default {{{dynamic_bitset<>}}}. In this case, the code
 is performed equivalently on all platforms.

 Anyway, if you are so confident, that it cannot generate errors in
 programs where BOOST_DYNAMIC_BITSET_PRIVATE is not "{{{treated as
 private}}}", you can remove the ticket.

-- 
Ticket URL: <https://svn.boost.org/trac/boost/ticket/6528#comment:4>
Boost C++ Libraries <http://www.boost.org/>
Boost provides free peer-reviewed portable C++ source libraries.

This archive was generated by hypermail 2.1.7 : 2017-02-16 18:50:08 UTC