forked from pool/zeromq
895e0bcb2a
- New upstream version 4.3.1: * CVE-2019-6250: A vulnerability has been found that would allow attackers to direct a peer to jump to and execute from an address indicated by the attacker. (bsc#1121717) * fixed race condition in ZMQ_PUSH when quickly disconnecting and reconnecting causes last part of multi-part message to get "stuck" and resent by mistake to the new socket. For complete set of changes, see, https://github.com/zeromq/libzmq/releases/tag/v4.3.1 https://github.com/zeromq/libzmq/releases/tag/v4.3.0 OBS-URL: https://build.opensuse.org/request/show/665699 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/zeromq?expand=0&rev=36 |
||
---|---|---|
.gitattributes | ||
.gitignore | ||
baselibs.conf | ||
zeromq-4.3.1.tar.gz | ||
zeromq.changes | ||
zeromq.spec |