DSA-4477-1 zeromq3 -- security update

Related Vulnerabilities: CVE-2019-13132  

Fang-Pen Lin discovered a stack-based buffer-overflow flaw in ZeroMQ, a lightweight messaging kernel library. A remote, unauthenticated client connecting to an application using the libzmq library, running with a socket listening with CURVE encryption/authentication enabled, can take advantage of this flaw to cause a denial of service or the execution of arbitrary code. For the oldstable distribution (stretch), this problem has been fixed in version 4.2.1-4+deb9u2. For the stable distribution (buster), this problem has been fixed in version 4.3.1-4+deb10u1. We recommend that you upgrade your zeromq3 packages. For the detailed security status of zeromq3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/zeromq3

Debian Security Advisory

DSA-4477-1 zeromq3 -- security update

Date Reported:
08 Jul 2019
Affected Packages:
zeromq3
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2019-13132.
More information:

Fang-Pen Lin discovered a stack-based buffer-overflow flaw in ZeroMQ, a lightweight messaging kernel library. A remote, unauthenticated client connecting to an application using the libzmq library, running with a socket listening with CURVE encryption/authentication enabled, can take advantage of this flaw to cause a denial of service or the execution of arbitrary code.

For the oldstable distribution (stretch), this problem has been fixed in version 4.2.1-4+deb9u2.

For the stable distribution (buster), this problem has been fixed in version 4.3.1-4+deb10u1.

We recommend that you upgrade your zeromq3 packages.

For the detailed security status of zeromq3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/zeromq3