From 623ee73d661e5ed8475cb264511f683407d87365 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Sun, 12 Apr 2020 03:41:30 +0100 Subject: gentoo Easter resync : 12.04.2020 --- metadata/glsa/glsa-202003-07.xml | 52 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 52 insertions(+) create mode 100644 metadata/glsa/glsa-202003-07.xml (limited to 'metadata/glsa/glsa-202003-07.xml') diff --git a/metadata/glsa/glsa-202003-07.xml b/metadata/glsa/glsa-202003-07.xml new file mode 100644 index 000000000000..ef7f30132b20 --- /dev/null +++ b/metadata/glsa/glsa-202003-07.xml @@ -0,0 +1,52 @@ + + + + RabbitMQ C client: Arbitrary code execution + A vulnerability in RabbitMQ C client might allow an attacker to + execute arbitrary code. + + rabbitmq-c + 2020-03-13 + 2020-03-13 + 701810 + remote + + + 0.10.0 + 0.10.0 + + + +

A C-language AMQP client library for use with v2.0+ of the RabbitMQ + broker. +

+
+ +

It was discovered that RabbitMQ C client incorrectly handled certain + inputs. +

+
+ +

A remote attacker, by sending a specially crafted request, could + possibly execute arbitrary code with the privileges of the process or + cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All RabbitMQ C client users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/rabbitmq-c-0.10.0" + + +
+ + CVE-2019-18609 + + whissi + whissi +
-- cgit v1.2.3