It was discovered that zeromq, a lightweight messaging kernel, is susceptible to a protocol downgrade attack on sockets using the ZMTP v3 protocol. This could allow remote attackers to bypass ZMTP v3 security mechanisms by sending ZMTP v2 or earlier headers. CVE request: http://openwall.com/lists/oss-security/2015/05/07/8 Upstream bug report: https://github.com/zeromq/libzmq/issues/1273 Upstream fix: https://github.com/zeromq/zeromq4-x/commit/b6e3e0f601e2c1ec1f3aac880ed6a3fe63043e51
If I read the whiteboard correctly fedora-all/zeromq should be not affected by this attack, but in F22 and F23 it is as versions 4.0.5 are used there. It is fixed in rawhide with: http://koji.fedoraproject.org/koji/buildinfo?buildID=637994 and an update for F22 is on the way: http://koji.fedoraproject.org/koji/buildinfo?buildID=637995 https://admin.fedoraproject.org/updates/FEDORA-2015-8635/zeromq-4.0.5-3.fc22
I believe fedora was noted as not affected as no released version include affected 4.x version.
zeromq-4.0.5-3.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
ceph-1.2 ships zeromq-3.2.5 which is not affected by this flaw.