SHA256
1
0
forked from pool/zeromq
Go to file
Adam Majer 2ad4cc8a87 - New upstream version 4.3.1:
* CVE-2019-6250: A vulnerability has been found that would allow
    attackers to direct a peer to jump to and execute from an address
    indicated by the attacker. (bsc#1121717)
  * fixed race condition in ZMQ_PUSH when quickly disconnecting and
    reconnecting causes last part of multi-part message to get
    "stuck" and resent by mistake to the new socket.
For complete set of changes, see,
https://github.com/zeromq/libzmq/releases/tag/v4.3.1
https://github.com/zeromq/libzmq/releases/tag/v4.3.0

OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/zeromq?expand=0&rev=70
2019-01-14 10:31:33 +00:00
.gitattributes Accepting request 85003 from network:messaging 2011-09-27 07:39:43 +00:00
.gitignore Accepting request 85003 from network:messaging 2011-09-27 07:39:43 +00:00
baselibs.conf Accepting request 621882 from home:dimstar:Factory 2018-07-10 12:25:12 +00:00
zeromq-4.3.1.tar.gz - New upstream version 4.3.1: 2019-01-14 10:31:33 +00:00
zeromq.changes - New upstream version 4.3.1: 2019-01-14 10:31:33 +00:00
zeromq.spec - New upstream version 4.3.1: 2019-01-14 10:31:33 +00:00