forked from pool/zeromq
- New upstream version 4.3.1:
* CVE-2019-6250: A vulnerability has been found that would allow attackers to direct a peer to jump to and execute from an address indicated by the attacker. (bsc#1121717) * fixed race condition in ZMQ_PUSH when quickly disconnecting and reconnecting causes last part of multi-part message to get "stuck" and resent by mistake to the new socket. For complete set of changes, see, https://github.com/zeromq/libzmq/releases/tag/v4.3.1 https://github.com/zeromq/libzmq/releases/tag/v4.3.0 OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/zeromq?expand=0&rev=70
This commit is contained in:
@@ -1,7 +1,7 @@
|
||||
#
|
||||
# spec file for package zeromq
|
||||
#
|
||||
# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany.
|
||||
# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
|
||||
#
|
||||
# All modifications and additions to the file contributed by third parties
|
||||
# remain the property of their copyright owners, unless otherwise agreed
|
||||
@@ -23,7 +23,7 @@
|
||||
%bcond_with pgm
|
||||
%endif
|
||||
Name: zeromq
|
||||
Version: 4.2.5
|
||||
Version: 4.3.1
|
||||
Release: 0
|
||||
Summary: Lightweight messaging kernel
|
||||
License: LGPL-3.0-or-later
|
||||
|
Reference in New Issue
Block a user