An uncontrolled resource consumption (memory leak) flaw was found in ZeroMQ's src/xpub.cpp in versions before 4.3.3. This flaw allows a remote unauthenticated attacker to send crafted PUB messages that consume excessive memory if the CURVE/ZAP authentication is disabled on the server, causing a denial of service. The highest threat from this vulnerability is to system availability.
{ "binaries": [ { "binary_name": "libzmq3-dev", "binary_version": "4.2.5-1ubuntu0.2+esm2" }, { "binary_name": "libzmq5", "binary_version": "4.2.5-1ubuntu0.2+esm2" }, { "binary_name": "libzmq5-dbgsym", "binary_version": "4.2.5-1ubuntu0.2+esm2" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "binaries": [ { "binary_name": "libzmq3-dev", "binary_version": "4.3.2-2ubuntu1.20.04.1~esm2" }, { "binary_name": "libzmq5", "binary_version": "4.3.2-2ubuntu1.20.04.1~esm2" }, { "binary_name": "libzmq5-dbgsym", "binary_version": "4.3.2-2ubuntu1.20.04.1~esm2" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }