You are here
Home > Preporuke > Sigurnosni nedostatak programske biblioteke zeromq

Sigurnosni nedostatak programske biblioteke zeromq

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for zeromq
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:1910-1
Rating: moderate
References: #1176116 #1176256 #1176257 #1176258 #1176259

Cross-References: CVE-2020-15166
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________

An update that solves one vulnerability and has four fixes
is now available.

Description:

This update for zeromq fixes the following issues:

– CVE-2020-15166: Fixed the possibility of unauthenticated clients causing
a denial-of-service (bsc#1176116).
– Fixed a heap overflow when receiving malformed ZMTP v1 packets
(bsc#1176256)
– Fixed a memory leak in client induced by malicious server(s) without
CURVE/ZAP (bsc#1176257)
– Fixed memory leak when processing PUB messages with metadata
(bsc#1176259)
– Fixed a stack overflow in PUB/XPUB subscription store (bsc#1176258)

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.2:

zypper in -t patch openSUSE-2020-1910=1

Package List:

– openSUSE Leap 15.2 (i586 x86_64):

libunwind-1.2.1-lp152.5.3.1
libunwind-debuginfo-1.2.1-lp152.5.3.1
libunwind-debugsource-1.2.1-lp152.5.3.1
libunwind-devel-1.2.1-lp152.5.3.1

– openSUSE Leap 15.2 (x86_64):

libunwind-32bit-1.2.1-lp152.5.3.1
libunwind-32bit-debuginfo-1.2.1-lp152.5.3.1
libzmq5-4.2.3-lp152.7.3.1
libzmq5-debuginfo-4.2.3-lp152.7.3.1
zeromq-debugsource-4.2.3-lp152.7.3.1
zeromq-devel-4.2.3-lp152.7.3.1
zeromq-tools-4.2.3-lp152.7.3.1
zeromq-tools-debuginfo-4.2.3-lp152.7.3.1

References:

https://www.suse.com/security/cve/CVE-2020-15166.html
https://bugzilla.suse.com/1176116
https://bugzilla.suse.com/1176256
https://bugzilla.suse.com/1176257
https://bugzilla.suse.com/1176258
https://bugzilla.suse.com/1176259
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org

openSUSE Security Update: Security update for zeromq
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:1907-1
Rating: moderate
References: #1176116 #1176256 #1176257 #1176258 #1176259

Cross-References: CVE-2020-15166
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________

An update that solves one vulnerability and has four fixes
is now available.

Description:

This update for zeromq fixes the following issues:

– CVE-2020-15166: Fixed the possibility of unauthenticated clients causing
a denial-of-service (bsc#1176116).
– Fixed a heap overflow when receiving malformed ZMTP v1 packets
(bsc#1176256)
– Fixed a memory leak in client induced by malicious server(s) without
CURVE/ZAP (bsc#1176257)
– Fixed memory leak when processing PUB messages with metadata
(bsc#1176259)
– Fixed a stack overflow in PUB/XPUB subscription store (bsc#1176258)

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-1907=1

Package List:

– openSUSE Leap 15.1 (i586 x86_64):

libunwind-1.2.1-lp151.4.3.1
libunwind-debuginfo-1.2.1-lp151.4.3.1
libunwind-debugsource-1.2.1-lp151.4.3.1
libunwind-devel-1.2.1-lp151.4.3.1

– openSUSE Leap 15.1 (x86_64):

libunwind-32bit-1.2.1-lp151.4.3.1
libunwind-32bit-debuginfo-1.2.1-lp151.4.3.1
libzmq5-4.2.3-lp151.5.6.1
libzmq5-debuginfo-4.2.3-lp151.5.6.1
zeromq-debugsource-4.2.3-lp151.5.6.1
zeromq-devel-4.2.3-lp151.5.6.1
zeromq-tools-4.2.3-lp151.5.6.1
zeromq-tools-debuginfo-4.2.3-lp151.5.6.1

References:

https://www.suse.com/security/cve/CVE-2020-15166.html
https://bugzilla.suse.com/1176116
https://bugzilla.suse.com/1176256
https://bugzilla.suse.com/1176257
https://bugzilla.suse.com/1176258
https://bugzilla.suse.com/1176259
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org

AutorDona Seruga
Cert idNCERT-REF-2020-11-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa chromium

Otkriveni su sigurnosni nedostaci u programskom paketu chromium za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja,...

Close