-
Notifications
You must be signed in to change notification settings - Fork 484
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2019-6250 exploit stops the puller io thread from receiving more messages #1005
Comments
@rajeshnair Thank you for the thorough bug report and test case. I would submit a PR with your fix and test case |
Let me know if you want me to raise the PR. |
Yes, please |
Thanks for the quick turnaround! Two questions
|
The next release will be 0.6.0 |
Do you have any timelines for that? Also , do I need to raise a PR towards |
@rajeshnair There is no timeline but @fbacchella and I talked about releasing 0.6.0 soon.
No, all releases come from |
Good Morning and wishing you a happy new year! Do we have any update on when the v0.6.0 would be released with the fix for this issue ? |
Background
We have a fairly large usage of JeroMQ and we noticed that in certain deployments, the JeroMQ puller stops receiving messages.
This issue seems similiar to what others have reported here and here, except that we hit this issue with PULL
One noticeable thing we found was that the deployments where we hit this issue had Security vulnerability scanner like Tenable or nessus deployed.
On deeper inspection, we have found at least one way to replicate this problem. But we believe there might be more.
This is through the exploit given in zeromq/libzmq#3351
CVE-2019-6250 impacts libczmq version < 4.3.3 with a remote code execution vulnerability
JeroMQ is not impacted by the Remote Code execution but when the exploit payload hits an existing Puller port, it crashes the Io thread causing it to stop processing more messages.
Our assumption is the security vulnerability tools are hitting with this payload since CVE-2019-6250 is a well known vulnerability.
Steps to reproduce
Bug screencast
Simpler JeroMQ testcase
I tried to write this up in a testcase but it blocks indefinitely. With the fix, the testcase passes.
Possible fix
The fix could be as simple as this.
This at least fixes this particular testcase.
We may need to add this check at more places.
If folks agree , I can raise a PR
The text was updated successfully, but these errors were encountered: