A vulnerability was discovered in ZeroMQ through 4.0.0 onwards which allows any unauthenticated client to cause a stack overflow on any server that is supposed to be protected by encryption/authentication. Arbitrary data sent by the client will overwrite the stack, so although the reporter didn't provide a specific exploit, it is entirely possible that a crafty attacker could take advantage of this vulnerability to do more than "just" crash the server.
Created zeromq tracking bugs for this issue: Affects: fedora-all [bug 1729830]
Created zeromq tracking bugs for this issue: Affects: epel-all [bug 1729831]
Reference: https://github.com/zeromq/libzmq/issues/3558
External References: https://www.openwall.com/lists/oss-security/2019/07/08/6
Created zeromq tracking bugs for this issue: Affects: openstack-rdo [bug 1729832]
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-13132