UbuntuUpdates.org

Package "zeromq3"

Name: zeromq3

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • lightweight messaging kernel (development files)
  • lightweight messaging kernel (shared library)

Latest version: 4.2.5-1ubuntu0.2
Release: bionic (18.04)
Level: security
Repository: universe

Links

Save this URL for the latest version of "zeromq3": https://www.ubuntuupdates.org/zeromq3



Other versions of "zeromq3" in Bionic

Repository Area Version
base universe 4.2.5-1
updates universe 4.2.5-1ubuntu0.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 4.2.5-1ubuntu0.2 2019-07-08 18:09:41 UTC

  zeromq3 (4.2.5-1ubuntu0.2) bionic-security; urgency=medium

  * SECURITY UPDATE: Unauthenticated client can cause a stack overflow on any
    server that is supposed to be protected by encryption/authentication,
    leading to a DoS (crash) or possibly other impact.
    - debian/patches/CVE-2019-13132.patch: create buffers large enough to
      contain arbitrary metadata.
    - CVE-2019-13132

 -- Eduardo Barretto <email address hidden> Wed, 03 Jul 2019 11:30:42 -0300

Source diff to previous version
CVE-2019-13132 denial of service via stack overflow

Version: 4.2.5-1ubuntu0.1 2019-01-17 15:06:40 UTC

  zeromq3 (4.2.5-1ubuntu0.1) bionic-security; urgency=medium

  * SECURITY UPDATE: Integer overflow allows an authenticated attacker to
    overwrite an arbitrary amount of bytes beyond the bounds of a buffer,
    which can be leveraged to run arbitrary code on the target system.
    - debian/patches/CVE-2019-6250.patch: Refactor bounds check arithmetic
      such that no overflow shall occur.
    - CVE-2019-6250

 -- Eduardo Barretto <email address hidden> Tue, 15 Jan 2019 12:06:02 -0200

CVE-2019-6250 A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::



About   -   Send Feedback to @ubuntu_updates