RabbitMQ C client: Arbitrary code execution — GLSA 202003-07

A vulnerability in RabbitMQ C client might allow an attacker to execute arbitrary code.

Affected packages

net-libs/rabbitmq-c on all architectures
Affected versions < 0.10.0
Unaffected versions >= 0.10.0

Background

A C-language AMQP client library for use with v2.0+ of the RabbitMQ broker.

Description

It was discovered that RabbitMQ C client incorrectly handled certain inputs.

Impact

A remote attacker, by sending a specially crafted request, could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All RabbitMQ C client users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-libs/rabbitmq-c-0.10.0"
 

References

Release date
March 13, 2020

Latest revision
March 13, 2020: 1

Severity
high

Exploitable
remote

Bugzilla entries