CVE-2021-20236

NameCVE-2021-20236
DescriptionA flaw was found in the ZeroMQ server in versions before 4.3.3. This flaw allows a malicious client to cause a stack buffer overflow on the server by sending crafted topic subscription requests and then unsubscribing. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
zeromq3 (PTS)buster, buster (security)4.3.1-4+deb10u2vulnerable
bullseye4.3.4-1+deb11u1fixed
bookworm4.3.4-6fixed
sid, trixie4.3.5-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
zeromq3source(unstable)4.3.3-1

Notes

[buster] - zeromq3 <no-dsa> (Minor issue)
[stretch] - zeromq3 <ignored> (Minor issue, too intrusive to backport)
https://github.com/zeromq/libzmq/pull/3959
https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22488

Search for package or bug name: Reporting problems