| Summary: | <net-libs/zeromq-4.0.6 <net-libs/zeromq-4.1.1: is susceptible to a protocol downgrade attack on sockets using the ZMTP v3 (CVE-2014-9721) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Thomas Deutschmann (RETIRED) <whissi> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | normal | CC: | jlec, qnikst |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | B4 [noglsa] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Thomas Deutschmann (RETIRED)
2015-05-11 14:46:23 UTC
+ 04 Jun 2015; Justin Lecher <jlec@gentoo.org> -zeromq-4.0.5.ebuild: + Drop vulnerable version, bug #549182 + Tree is clean again. Am I understanding it correctly that this functionality was introduced in the 4.x series and as such the stable 3.2 series is not affected? (In reply to Kristian Fiskerstrand from comment #2) > Am I understanding it correctly that this functionality was introduced in > the 4.x series and as such the stable 3.2 series is not affected? That's how I understand it. I asked upstream for confirmation. Nevertheless I already asked for stabilization of version 4 too. (In reply to Justin Lecher from comment #3) > That's how I understand it. I asked upstream for confirmation. Upstream confirmed that only version 4 was and could be vulnerable. CVE-2014-9721 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9721): libzmq before 4.0.6 and 4.1.x before 4.1.1 allows remote attackers to conduct downgrade attacks and bypass ZMPT v3 protocol security mechanisms via a ZMTP v2 or earlier header. GLSA Vote: No |