UbuntuUpdates.org

Package "zeromq3"

Name: zeromq3

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • lightweight messaging kernel (development files)
  • lightweight messaging kernel (shared library)

Latest version: 4.2.5-2ubuntu0.2
Release: cosmic (18.10)
Level: security
Repository: universe

Links

Save this URL for the latest version of "zeromq3": https://www.ubuntuupdates.org/zeromq3



Other versions of "zeromq3" in Cosmic

Repository Area Version
base universe 4.2.5-2
updates universe 4.2.5-2ubuntu0.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 4.2.5-2ubuntu0.2 2019-07-08 18:09:47 UTC

  zeromq3 (4.2.5-2ubuntu0.2) cosmic-security; urgency=medium

  * SECURITY UPDATE: Unauthenticated client can cause a stack overflow on any
    server that is supposed to be protected by encryption/authentication,
    leading to a DoS (crash) or possibly other impact.
    - debian/patches/CVE-2019-13132.patch: create buffers large enough to
      contain arbitrary metadata.
    - CVE-2019-13132

 -- Eduardo Barretto <email address hidden> Wed, 03 Jul 2019 11:29:28 -0300

Source diff to previous version
CVE-2019-13132 denial of service via stack overflow

Version: 4.2.5-2ubuntu0.1 2019-01-17 15:06:42 UTC

  zeromq3 (4.2.5-2ubuntu0.1) cosmic-security; urgency=medium

  * SECURITY UPDATE: Integer overflow allows an authenticated attacker to
    overwrite an arbitrary amount of bytes beyond the bounds of a buffer,
    which can be leveraged to run arbitrary code on the target system.
    - debian/patches/CVE-2019-6250.patch: Refactor bounds check arithmetic
      such that no overflow shall occur.
    - CVE-2019-6250

 -- Eduardo Barretto <email address hidden> Tue, 15 Jan 2019 12:45:20 -0200

CVE-2019-6250 A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::



About   -   Send Feedback to @ubuntu_updates