July 9th, 2019
ZeroMQ is vulnerable to denial of service attacks or possible remote code execution.
Package(s) : zeromq, zeromq3 Qlustar releases : 10.1, 11.0 Affected versions: All versions prior to this update Vulnerability : denial of service/possible remote code execution Problem type : network Qlustar-specific : no CVE Id(s) : CVE-2019-13132
A remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library.
Users running public Qlustar head-nodes are highly encouraged to upgrade as soon as possible, as there are no known mitigations.
The problem can be corrected by updating your system to the following Qlustar package versions (follow the Qlustar Update Instructions):
libzmq5 4.2.5-1+ql.2+11-bionic
libzmq5 4.2.3-ql.4+10-xenial
Note that the new package needs to be installed only on the head-node(s). After installing the new libzmq5 package, restart the qluman router as follows:
$ service qluman-router restart