Hello,

the following is based on the publicly available information as present
on / linked to from
<https://security-tracker.debian.org/tracker/CVE-2023-35789>.

On Mon, Dec 09, 2024 at 03:20:03PM +0000, P Tamil Selvam wrote:
> We are currently using Debian Bookworm 12.8 and have identified a
> vulnerability issue with the librabbitmq package. Could you please
> confirm if there is an ETA for a fix or update to address this in an
> upcoming Bookworm release?

By its very nature (cf. the detailed description as linked above), this
vulnerability cannot be fixed with a drop-in replacement while keeping
the current user interface: if credentials have been entered on the
command line, they will remain visible to other local users on the same
system unless special precautions are taken.

For that reason I have refrained from backporting the upstream patch to
Bookworm so far, because applying that patch would not fix those systems
where people have already configured / keep using ampq tools in that
way. Instead people would also need to individually fix their setups to
use the new command line option that the upstream patch adds.

Changing interfaces in a stable release needs to be done with great
care. Given that this vulnerability is actually only of minor
importance, there was no pressing need to do so.

> Additionally, if there are any available workarounds or interim
> solutions, kindly share those as well.

First of all, for this vulnerability to actually take effect, you'd need
to have a multi-user system running (i.e. a shared system without any
compartmentalization and with the option to execute arbitrary commands)
where people can actually view other people's process arguments (i.e. no
"hidepid" or PID namespaces in containers or such in effect) and where
the ampq tools are actually used (i.e. publishing and consuming messages
using the AMQP client binaries as opposed to via some language
bindings). This provides quite some angles for workarounds.

HTH,
Flo

Attachment: signature.asc
Description: PGP signature

Reply via email to