Overview
Request 665699 accepted
- New upstream version 4.3.1:
* CVE-2019-6250: A vulnerability has been found that would allow
attackers to direct a peer to jump to and execute from an address
indicated by the attacker. (bsc#1121717)
* fixed race condition in ZMQ_PUSH when quickly disconnecting and
reconnecting causes last part of multi-part message to get
"stuck" and resent by mistake to the new socket.
For complete set of changes, see,
https://github.com/zeromq/libzmq/releases/tag/v4.3.1
https://github.com/zeromq/libzmq/releases/tag/v4.3.0
Request History
adamm created request
- New upstream version 4.3.1:
* CVE-2019-6250: A vulnerability has been found that would allow
attackers to direct a peer to jump to and execute from an address
indicated by the attacker. (bsc#1121717)
* fixed race condition in ZMQ_PUSH when quickly disconnecting and
reconnecting causes last part of multi-part message to get
"stuck" and resent by mistake to the new socket.
For complete set of changes, see,
https://github.com/zeromq/libzmq/releases/tag/v4.3.1
https://github.com/zeromq/libzmq/releases/tag/v4.3.0
licensedigger accepted review
ok
factory-auto added opensuse-review-team as a reviewer
Please review sources
factory-auto added repo-checker as a reviewer
Please review build success
factory-auto accepted review
Check script succeeded
namtrac accepted review
dimstar_suse set openSUSE:Factory:Staging:E as a staging project
Being evaluated by staging project "openSUSE:Factory:Staging:E"
dimstar_suse accepted review
Picked openSUSE:Factory:Staging:E
repo-checker accepted review
cycle and install check passed
dimstar_suse accepted review
ready to accept
dimstar_suse approved review
ready to accept
dimstar_suse accepted request
Accept to openSUSE:Factory