SHA256
1
0
forked from pool/zeromq

- New upstream version 4.3.1:

* CVE-2019-6250: A vulnerability has been found that would allow
    attackers to direct a peer to jump to and execute from an address
    indicated by the attacker. (bsc#1121717)
  * fixed race condition in ZMQ_PUSH when quickly disconnecting and
    reconnecting causes last part of multi-part message to get
    "stuck" and resent by mistake to the new socket.
For complete set of changes, see,
https://github.com/zeromq/libzmq/releases/tag/v4.3.1
https://github.com/zeromq/libzmq/releases/tag/v4.3.0

OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/zeromq?expand=0&rev=70
This commit is contained in:
2019-01-14 10:31:33 +00:00
committed by Git OBS Bridge
parent e57b1b3381
commit 2ad4cc8a87
4 changed files with 20 additions and 5 deletions

View File

@@ -1,7 +1,7 @@
#
# spec file for package zeromq
#
# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany.
# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -23,7 +23,7 @@
%bcond_with pgm
%endif
Name: zeromq
Version: 4.2.5
Version: 4.3.1
Release: 0
Summary: Lightweight messaging kernel
License: LGPL-3.0-or-later