ZeroMQ libzmq 4.3.3 has a heap-based buffer overflow in zmq::tcp_read by resizing a fixed static allocator, a different vulnerability than CVE-2021-20235. Upstream Reference: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26042 Upstream fix: https://github.com/zeromq/libzmq/commit/397ac80850bf8d010fae23dd215db0ee2c677306
Created zeromq tracking bugs for this issue: Affects: epel-7 [bug 1980261] Affects: openstack-rdo [bug 1980263] Created zeromq3 tracking bugs for this issue: Affects: epel-7 [bug 1980262]
Flaw summary: The c_single_allocator class in src/decoder_allocators.hpp of libzmq has a resize method which attempts to resize the static allocator when it should not (since it's a fixed buffer by design).
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-36400