Bug 1221666 (CVE-2014-9721)
Summary: | CVE-2014-9721 zeromq: protocol downgrade attack on sockets using the ZMTP v3 protocol | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vasyl Kaigorodov <vkaigoro> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | andrewniemants, carnil, ceph-eng-bugs, denis.arnaud_fedora, jose.p.oliveira.oss, mrunge, sisharma, tomspur |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | 0MQ 4.0.6 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-07-06 10:45:01 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1221668 |
Description
Vasyl Kaigorodov
2015-05-14 14:08:32 UTC
If I read the whiteboard correctly fedora-all/zeromq should be not affected by this attack, but in F22 and F23 it is as versions 4.0.5 are used there. It is fixed in rawhide with: http://koji.fedoraproject.org/koji/buildinfo?buildID=637994 and an update for F22 is on the way: http://koji.fedoraproject.org/koji/buildinfo?buildID=637995 https://admin.fedoraproject.org/updates/FEDORA-2015-8635/zeromq-4.0.5-3.fc22 I believe fedora was noted as not affected as no released version include affected 4.x version. zeromq-4.0.5-3.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report. ceph-1.2 ships zeromq-3.2.5 which is not affected by this flaw. |