CVE-2021-20236

NameCVE-2021-20236
DescriptionA flaw was found in the ZeroMQ server in versions before 4.3.3. This flaw allows a malicious client to cause a stack buffer overflow on the server by sending crafted topic subscription requests and then unsubscribing. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
zeromq3 (PTS)jessie, jessie (lts)4.0.5+dfsg-2+deb8u4vulnerable
stretch (security), stretch (lts), stretch4.2.1-4+deb9u4vulnerable
buster, buster (lts)4.3.1-4+deb10u3vulnerable
buster (security)4.3.1-4+deb10u2vulnerable
bullseye4.3.4-1+deb11u1fixed
bookworm4.3.4-6fixed
sid, trixie4.3.5-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
zeromq3source(unstable)4.3.3-1

Notes

[buster] - zeromq3 <no-dsa> (Minor issue)
[stretch] - zeromq3 <ignored> (Minor issue, too intrusive to backport)
https://github.com/zeromq/libzmq/pull/3959
https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22488
[jessie] - zeromq3 <ignored> (Minor issue, too intrusive to backport)

Search for package or bug name: Reporting problems