UbuntuUpdates.org

Package "libzmq5"

Name: libzmq5

Description:

lightweight messaging kernel (shared library)

Latest version: 4.2.5-1ubuntu0.2
Release: bionic (18.04)
Level: security
Repository: universe
Head package: zeromq3
Homepage: https://www.zeromq.org/

Links


Download "libzmq5"


Other versions of "libzmq5" in Bionic

Repository Area Version
base universe 4.2.5-1
updates universe 4.2.5-1ubuntu0.2

Changelog

Version: 4.2.5-1ubuntu0.2 2019-07-08 18:09:41 UTC

  zeromq3 (4.2.5-1ubuntu0.2) bionic-security; urgency=medium

  * SECURITY UPDATE: Unauthenticated client can cause a stack overflow on any
    server that is supposed to be protected by encryption/authentication,
    leading to a DoS (crash) or possibly other impact.
    - debian/patches/CVE-2019-13132.patch: create buffers large enough to
      contain arbitrary metadata.
    - CVE-2019-13132

 -- Eduardo Barretto <email address hidden> Wed, 03 Jul 2019 11:30:42 -0300

Source diff to previous version
CVE-2019-13132 denial of service via stack overflow

Version: 4.2.5-1ubuntu0.1 2019-01-17 15:06:40 UTC

  zeromq3 (4.2.5-1ubuntu0.1) bionic-security; urgency=medium

  * SECURITY UPDATE: Integer overflow allows an authenticated attacker to
    overwrite an arbitrary amount of bytes beyond the bounds of a buffer,
    which can be leveraged to run arbitrary code on the target system.
    - debian/patches/CVE-2019-6250.patch: Refactor bounds check arithmetic
      such that no overflow shall occur.
    - CVE-2019-6250

 -- Eduardo Barretto <email address hidden> Tue, 15 Jan 2019 12:06:02 -0200

CVE-2019-6250 A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::



About   -   Send Feedback to @ubuntu_updates