Source: librabbitmq Version: 0.9.0-0.2 Severity: important Tags: security upstream
Hi, The following vulnerability was published for librabbitmq. CVE-2019-18609[0]: | An issue was discovered in amqp_handle_input in amqp_connection.c in | rabbitmq-c 0.9.0. There is an integer overflow that leads to heap | memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue | server could return a malicious frame header that leads to a smaller | target_size value than needed. This condition is then carried on to a | memcpy function that copies too much data into a heap buffer. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2019-18609 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18609 [1] https://github.com/alanxz/rabbitmq-c/commit/fc85be7123050b91b054e45b91c78d3241a5047a Please adjust the affected versions in the BTS as needed. Regards, Salvatore