Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
aports
aports
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 647
    • Issues 647
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge Requests 210
    • Merge Requests 210
  • CI / CD
    • CI / CD
    • Pipelines
    • Jobs
    • Schedules
  • Operations
    • Operations
    • Incidents
    • Environments
  • Analytics
    • Analytics
    • CI / CD
    • Repository
    • Value Stream
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
  • alpine
  • aportsaports
  • Issues
  • #9878

Closed
Open
Opened Jan 21, 2019 by Alicha CH@alichaReporter

[3.7] zeromq: Integer overflow in zmq::v2_decoder_t::size_ready (CVE-2019-6250)

A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The memory layout allows the attacker to inject OS commands into a data structure located immediately after the problematic buffer (i.e., it is not necessary to use a typical buffer-overflow exploitation technique that changes the flow of control).

References:

https://github.com/zeromq/libzmq/releases/tag/v4.3.1
https://nvd.nist.gov/vuln/detail/CVE-2019-6250

Patch:

https://github.com/zeromq/libzmq/pull/3353/commits/1a2ed12716693073032d57dac4e269df3d373751

(from redmine: issue id 9878, created on 2019-01-21, closed on 2019-02-14)

  • Relations:
    • parent #9875 (closed)
  • Changesets:
    • Revision 9ee02b0d on 2019-02-04T11:21:52Z:
main/zeromq: upgrade to 4.2.5, security fix (CVE-2019-6250)

Fixes #9878
To upload designs, you'll need to enable LFS and have admin enable hashed storage. More information
Assignee
Assign to
3.7.2
Milestone
3.7.2
Assign milestone
Time tracking
None
Due date
None
Reference: alpine/aports#9878