libzmq.so is vulnerable to arbitrary code execution. A pointer overflow in the zmq::v2_decoder_t::size_ready
function in v2_decoder.cpp
allows an authenticated attacker to overwrite the bounds of a buffer and execute arbitrary OS commands on the system.