Source: librabbitmq
Version: 0.9.0-0.2
Severity: important
Tags: security upstream

Hi,

The following vulnerability was published for librabbitmq.

CVE-2019-18609[0]:
| An issue was discovered in amqp_handle_input in amqp_connection.c in
| rabbitmq-c 0.9.0. There is an integer overflow that leads to heap
| memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue
| server could return a malicious frame header that leads to a smaller
| target_size value than needed. This condition is then carried on to a
| memcpy function that copies too much data into a heap buffer.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-18609
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18609
[1] 
https://github.com/alanxz/rabbitmq-c/commit/fc85be7123050b91b054e45b91c78d3241a5047a

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to