|
|
Subscribe / Log in / New account

Arch Linux alert ASA-202009-15 (lib32-zeromq)

From:  Morten Linderud <foxboron@archlinux.org>
To:  arch-security@archlinux.org
Subject:  [ASA-202009-15] lib32-zeromq: denial of service
Date:  Tue, 06 Oct 2020 22:10:57 +0200
Message-ID:  <20201006201057.bdrdolzubhoanpuw@anathema>

Arch Linux Security Advisory ASA-202009-15 ========================================== Severity: High Date : 2020-09-26 CVE-ID : CVE-2020-15166 Package : lib32-zeromq Type : denial of service Remote : Yes Link : https://security.archlinux.org/AVG-1220 Summary ======= The package lib32-zeromq before version 4.3.3-1 is vulnerable to denial of service. Resolution ========== Upgrade to 4.3.3-1. # pacman -Syu "lib32-zeromq>=4.3.3-1" The problem has been fixed upstream in version 4.3.3. Workaround ========== None. Description =========== A denial of service has been found in libzmq before 4.3.3, allowing unauthenticated clients to prevent legitimate clients from exchange any message with a CURVE/ZAP-protected server. Impact ====== A remote attacker might be able to cause a denial of service through a malicious connection. References ========== https://github.com/zeromq/libzmq/security/advisories/GHSA... https://github.com/zeromq/libzmq/pull/3913/commits/e7f009... https://oss-fuzz.com/testcase-detail/5707174518194176 https://security.archlinux.org/CVE-2020-15166


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds