In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running public servers with the above configuration are highly encouraged to upgrade as soon as possible, as there are no known mitigations.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "high", "binaries": [ { "libzmq3-dev": "4.0.4+dfsg-2ubuntu0.1+esm1", "libzmq3-dbgsym": "4.0.4+dfsg-2ubuntu0.1+esm1", "libzmq3-dev-dbgsym": "4.0.4+dfsg-2ubuntu0.1+esm1", "libzmq3": "4.0.4+dfsg-2ubuntu0.1+esm1", "libzmq3-dbg": "4.0.4+dfsg-2ubuntu0.1+esm1" } ] }