UbuntuUpdates.org

Bugs fixes in "zeromq3"

Origin Bug number Title Date fixed
CVE CVE-2019-13132 denial of service via stack overflow 2019-07-08
CVE CVE-2019-13132 denial of service via stack overflow 2019-07-08
CVE CVE-2019-13132 denial of service via stack overflow 2019-07-08
CVE CVE-2019-13132 denial of service via stack overflow 2019-07-08
CVE CVE-2019-6250 A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t:: 2019-01-17
CVE CVE-2019-6250 A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t:: 2019-01-17
CVE CVE-2014-9721 libzmq before 4.0.6 and 4.1.x before 4.1.1 allows remote attackers to conduct downgrade attacks and bypass ZMTP v3 protocol security mechanisms via a 2018-08-07
CVE CVE-2014-7203 libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks 2018-08-07
CVE CVE-2014-7202 stream_engine.cpp in libzmq (aka ZeroMQ/C++)) 4.0.5 before 4.0.5 allows man-in-the-middle attackers to conduct downgrade attacks via a crafted connec 2018-08-07
CVE CVE-2014-9721 libzmq before 4.0.6 and 4.1.x before 4.1.1 allows remote attackers to conduct downgrade attacks and bypass ZMTP v3 protocol security mechanisms via a 2018-08-07
CVE CVE-2014-7203 libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks 2018-08-07
CVE CVE-2014-7202 stream_engine.cpp in libzmq (aka ZeroMQ/C++)) 4.0.5 before 4.0.5 allows man-in-the-middle attackers to conduct downgrade attacks via a crafted connec 2018-08-07
Debian 741746 ITA: zeromq3 -- lightweight messaging kernel - Debian Bug report logs 2014-04-04
Debian 736353 zeromq3: Add zeromq 4.0.3 - Debian Bug report logs 2014-02-19
Debian 736353 zeromq3: Add zeromq 4.0.3 - Debian Bug report logs 2014-02-19



About   -   Send Feedback to @ubuntu_updates