openSUSE: 2020:1910-1 moderate: zeromq
Description
This update for zeromq fixes the following issues: - CVE-2020-15166: Fixed the possibility of unauthenticated clients causing a denial-of-service (bsc#1176116). - Fixed a heap overflow when receiving malformed ZMTP v1 packets (bsc#1176256) - Fixed a memory leak in client induced by malicious server(s) without CURVE/ZAP (bsc#1176257) - Fixed memory leak when processing PUB messages with metadata (bsc#1176259) - Fixed a stack overflow in PUB/XPUB subscription store (bsc#1176258) This update was imported from the SUSE:SLE-15:Update update project.
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2020-1910=1
Package List
- openSUSE Leap 15.2 (i586 x86_64): libunwind-1.2.1-lp152.5.3.1 libunwind-debuginfo-1.2.1-lp152.5.3.1 libunwind-debugsource-1.2.1-lp152.5.3.1 libunwind-devel-1.2.1-lp152.5.3.1 - openSUSE Leap 15.2 (x86_64): libunwind-32bit-1.2.1-lp152.5.3.1 libunwind-32bit-debuginfo-1.2.1-lp152.5.3.1 libzmq5-4.2.3-lp152.7.3.1 libzmq5-debuginfo-4.2.3-lp152.7.3.1 zeromq-debugsource-4.2.3-lp152.7.3.1 zeromq-devel-4.2.3-lp152.7.3.1 zeromq-tools-4.2.3-lp152.7.3.1 zeromq-tools-debuginfo-4.2.3-lp152.7.3.1
References
https://www.suse.com/security/cve/CVE-2020-15166.html https://bugzilla.suse.com/1176116 https://bugzilla.suse.com/1176256 https://bugzilla.suse.com/1176257 https://bugzilla.suse.com/1176258 https://bugzilla.suse.com/1176259 openSUSE Security Announce mailing list -- security-announce@lists.opensuse.org To unsubscribe, email security-announce-leave@lists.opensuse.org List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/