libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks via unspecified vectors.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.0.4+dfsg-2ubuntu0.1", "binary_name": "libzmq3" }, { "binary_version": "4.0.4+dfsg-2ubuntu0.1", "binary_name": "libzmq3-dbg" }, { "binary_version": "4.0.4+dfsg-2ubuntu0.1", "binary_name": "libzmq3-dbgsym" }, { "binary_version": "4.0.4+dfsg-2ubuntu0.1", "binary_name": "libzmq3-dev" }, { "binary_version": "4.0.4+dfsg-2ubuntu0.1", "binary_name": "libzmq3-dev-dbgsym" } ] }