MGASA-2019-0323

Source
https://advisories.mageia.org/MGASA-2019-0323.html
Import Source
https://advisories.mageia.org/MGASA-2019-0323.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2019-0323
Related
Published
2019-11-14T16:58:51Z
Modified
2019-11-14T16:36:50Z
Summary
Updated zeromq packages fix security vulnerability
Details

A security vulnerability has been reported in libzmq/zeromq.

a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running public servers with the above configuration are highly encouraged to upgrade as soon as possible, as there are no known mitigations. All versions from 4.0.0 and upwards are affected (CVE-2019-13132).

References
Credits

Affected packages

Mageia:7 / zeromq

Package

Name
zeromq
Purl
pkg:rpm/mageia/zeromq?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3.2-1.mga7

Ecosystem specific

{
    "section": "core"
}