RabbitMQ C client: Arbitrary code execution A vulnerability in RabbitMQ C client might allow an attacker to execute arbitrary code. rabbitmq-c 2020-03-13 2020-03-13 701810 remote 0.10.0 0.10.0

A C-language AMQP client library for use with v2.0+ of the RabbitMQ broker.

It was discovered that RabbitMQ C client incorrectly handled certain inputs.

A remote attacker, by sending a specially crafted request, could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.

There is no known workaround at this time.

All RabbitMQ C client users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/rabbitmq-c-0.10.0"
CVE-2019-18609 whissi whissi