Bug 1921989 (CVE-2021-20237)

Summary: CVE-2021-20237 zeromq: Memory leaks via metadata messages processed by PUB sockets
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: amctagga, andrewniemants, anharris, bniver, dbecker, denis.arnaud_fedora, extras-orphan, flucifre, gmeno, hvyas, jjoyce, jschluet, lhh, lpeer, mbenjamin, mburns, mhackett, rhel8-maint, sclewis, slinaber, sostapov, tomspur, vereddy
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: zeromq 4.3.3 Doc Type: If docs needed, set a value
Doc Text:
An uncontrolled resource consumption (memory leak) flaw was found in ZeroMQ's src/xpub.cpp. This flaw allows a remote unauthenticated attacker to send crafted PUB messages that consume excessive memory if the CURVE/ZAP authentication is disabled on the server, causing a denial of service. The highest threat from this vulnerability is to system availability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-02-11 22:09:52 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1921990, 1921992, 1921993, 1921994    
Bug Blocks: 1921995    

Description Pedro Sampaio 2021-01-29 00:46:57 UTC
A flaw was found in zeromq before 4.3.3. Messages with metadata are never processed by PUB sockets, but the metadata is kept referenced in the PUB object and never freed leading to memory leaks.

References:

https://github.com/zeromq/libzmq/pull/3935
https://github.com/zeromq/libzmq/security/advisories/GHSA-4p5v-h92w-6wxw
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22344

Comment 1 Pedro Sampaio 2021-01-29 00:47:52 UTC
Created zeromq tracking bugs for this issue:

Affects: epel-all [bug 1921994]
Affects: fedora-all [bug 1921992]
Affects: openstack-rdo [bug 1921993]


Created zeromq3 tracking bugs for this issue:

Affects: epel-7 [bug 1921990]

Comment 2 Denis Arnaud 2021-01-30 00:16:09 UTC
Fixed by https://bodhi.fedoraproject.org/updates/FEDORA-2021-a01e258e6d

Comment 3 Fedora Update System 2021-02-08 01:29:42 UTC
FEDORA-2021-8b3202b783 has been pushed to the Fedora 33 stable repository.
If problem still persists, please make note of it in this bug report.

Comment 5 Todd Cullum 2021-02-12 20:41:47 UTC
External References:

https://github.com/zeromq/libzmq/security/advisories/GHSA-4p5v-h92w-6wxw

Comment 6 Fedora Update System 2021-02-17 04:16:05 UTC
FEDORA-EPEL-2021-5e4b80b9d8 has been pushed to the Fedora EPEL 8 stable repository.
If problem still persists, please make note of it in this bug report.