-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: librabbitmq security update
Advisory ID:       RHSA-2020:3949-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:3949
Issue date:        2020-09-29
CVE Names:         CVE-2019-18609 
====================================================================
1. Summary:

An update for librabbitmq is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

3. Description:

The librabbitmq packages provide an Advanced Message Queuing Protocol
(AMQP) client library that allows you to communicate with AMQP serversusing protocol version 0-9-1.

Security Fix(es):

* librabbitmq: integer overflow in amqp_handle_input in amqp_connection.c
leads to heap-based buffer overflow (CVE-2019-18609)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.9 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1786646 - CVE-2019-18609 librabbitmq: integer overflow in amqp_handle_input in amqp_connection.c leads to heap-based buffer overflow

6. Package List:

Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
librabbitmq-0.8.0-3.el7.src.rpm

x86_64:
librabbitmq-0.8.0-3.el7.i686.rpm
librabbitmq-0.8.0-3.el7.x86_64.rpm
librabbitmq-debuginfo-0.8.0-3.el7.i686.rpm
librabbitmq-debuginfo-0.8.0-3.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64:
librabbitmq-debuginfo-0.8.0-3.el7.i686.rpm
librabbitmq-debuginfo-0.8.0-3.el7.x86_64.rpm
librabbitmq-devel-0.8.0-3.el7.i686.rpm
librabbitmq-devel-0.8.0-3.el7.x86_64.rpm
librabbitmq-examples-0.8.0-3.el7.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
librabbitmq-0.8.0-3.el7.src.rpm

ppc64:
librabbitmq-0.8.0-3.el7.ppc.rpm
librabbitmq-0.8.0-3.el7.ppc64.rpm
librabbitmq-debuginfo-0.8.0-3.el7.ppc.rpm
librabbitmq-debuginfo-0.8.0-3.el7.ppc64.rpm

ppc64le:
librabbitmq-0.8.0-3.el7.ppc64le.rpm
librabbitmq-debuginfo-0.8.0-3.el7.ppc64le.rpm

s390x:
librabbitmq-0.8.0-3.el7.s390.rpm
librabbitmq-0.8.0-3.el7.s390x.rpm
librabbitmq-debuginfo-0.8.0-3.el7.s390.rpm
librabbitmq-debuginfo-0.8.0-3.el7.s390x.rpm

x86_64:
librabbitmq-0.8.0-3.el7.i686.rpm
librabbitmq-0.8.0-3.el7.x86_64.rpm
librabbitmq-debuginfo-0.8.0-3.el7.i686.rpm
librabbitmq-debuginfo-0.8.0-3.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64:
librabbitmq-debuginfo-0.8.0-3.el7.ppc.rpm
librabbitmq-debuginfo-0.8.0-3.el7.ppc64.rpm
librabbitmq-devel-0.8.0-3.el7.ppc.rpm
librabbitmq-devel-0.8.0-3.el7.ppc64.rpm
librabbitmq-examples-0.8.0-3.el7.ppc64.rpm

ppc64le:
librabbitmq-debuginfo-0.8.0-3.el7.ppc64le.rpm
librabbitmq-devel-0.8.0-3.el7.ppc64le.rpm
librabbitmq-examples-0.8.0-3.el7.ppc64le.rpm

s390x:
librabbitmq-debuginfo-0.8.0-3.el7.s390.rpm
librabbitmq-debuginfo-0.8.0-3.el7.s390x.rpm
librabbitmq-devel-0.8.0-3.el7.s390.rpm
librabbitmq-devel-0.8.0-3.el7.s390x.rpm
librabbitmq-examples-0.8.0-3.el7.s390x.rpm

x86_64:
librabbitmq-debuginfo-0.8.0-3.el7.i686.rpm
librabbitmq-debuginfo-0.8.0-3.el7.x86_64.rpm
librabbitmq-devel-0.8.0-3.el7.i686.rpm
librabbitmq-devel-0.8.0-3.el7.x86_64.rpm
librabbitmq-examples-0.8.0-3.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
librabbitmq-0.8.0-3.el7.src.rpm

x86_64:
librabbitmq-0.8.0-3.el7.i686.rpm
librabbitmq-0.8.0-3.el7.x86_64.rpm
librabbitmq-debuginfo-0.8.0-3.el7.i686.rpm
librabbitmq-debuginfo-0.8.0-3.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64:
librabbitmq-debuginfo-0.8.0-3.el7.i686.rpm
librabbitmq-debuginfo-0.8.0-3.el7.x86_64.rpm
librabbitmq-devel-0.8.0-3.el7.i686.rpm
librabbitmq-devel-0.8.0-3.el7.x86_64.rpm
librabbitmq-examples-0.8.0-3.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-18609
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBX3OjkdzjgjWX9erEAQhqoQ//bDEmtr09kB3tNsueySxTvQzx/IMTckmP
9bfpjsvzPb0ra6bjQ5U4k3fzx/Iz0tq4IkQ0r6RqiqhytKBttaCGKcLirAaojXJx
iHlrH6LjOE3C5rsqshEv//ymN5xaBM2QhmnrfWhubiXSP1Vro3jITSREyACv24eq
hHCIE6Z1qpoIkPw4VgRN5wVwWTJ7KdF1FkEVaUQekd0Ld06949NdAJU10LVYV0DR
CmsASNpK6WO4dz/kFsSRT64jcS+lz3EjZCtNoXiNPYrvI6cJTl3QkD0AY0Z6gR6q
qbP/+Y3TJ7XP1LnTJ3ebBqAXphs+Vki1jvuZNBEm89WATWtKJQxOb7OmGPOEA0MB
y1UazrhsaIzZdKi7S1rPe4phU/tRhYNvgUfyH+CwyKUd7S+EiULKDZJdpB47uV+9
1L6RsH29n37k4MTXIvbQloanz4MBnEIJwKCJIoD1mOM4joRhvP/j0zIYXLU+/Wfi
rYNJi9ChknOV7BWV/Iupu9Nt6EG30bC4oLPM1q6QpRpn5JVQYF8umGzDp2voIY9t
puLdA00MjMqyUVX1IUPjw/2VWwP/wOSAkWiwTJXcX2UL7urtRBbIGC7tT3eUzeqo
Qpl/eKUDSgUFCyr/hhpCrND37boIVmFkW+3If7cNn83FmbmA5sA/yoi6h2Xk4TM/
+YEy/bdXFuI=/PRZ
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-3949:01 Moderate: librabbitmq security update

An update for librabbitmq is now available for Red Hat Enterprise Linux 7

Summary

The librabbitmq packages provide an Advanced Message Queuing Protocol (AMQP) client library that allows you to communicate with AMQP serversusing protocol version 0-9-1.
Security Fix(es):
* librabbitmq: integer overflow in amqp_handle_input in amqp_connection.c leads to heap-based buffer overflow (CVE-2019-18609)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2019-18609 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index

Package List

Red Hat Enterprise Linux ComputeNode (v. 7):
Source: librabbitmq-0.8.0-3.el7.src.rpm
x86_64: librabbitmq-0.8.0-3.el7.i686.rpm librabbitmq-0.8.0-3.el7.x86_64.rpm librabbitmq-debuginfo-0.8.0-3.el7.i686.rpm librabbitmq-debuginfo-0.8.0-3.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: librabbitmq-debuginfo-0.8.0-3.el7.i686.rpm librabbitmq-debuginfo-0.8.0-3.el7.x86_64.rpm librabbitmq-devel-0.8.0-3.el7.i686.rpm librabbitmq-devel-0.8.0-3.el7.x86_64.rpm librabbitmq-examples-0.8.0-3.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: librabbitmq-0.8.0-3.el7.src.rpm
ppc64: librabbitmq-0.8.0-3.el7.ppc.rpm librabbitmq-0.8.0-3.el7.ppc64.rpm librabbitmq-debuginfo-0.8.0-3.el7.ppc.rpm librabbitmq-debuginfo-0.8.0-3.el7.ppc64.rpm
ppc64le: librabbitmq-0.8.0-3.el7.ppc64le.rpm librabbitmq-debuginfo-0.8.0-3.el7.ppc64le.rpm
s390x: librabbitmq-0.8.0-3.el7.s390.rpm librabbitmq-0.8.0-3.el7.s390x.rpm librabbitmq-debuginfo-0.8.0-3.el7.s390.rpm librabbitmq-debuginfo-0.8.0-3.el7.s390x.rpm
x86_64: librabbitmq-0.8.0-3.el7.i686.rpm librabbitmq-0.8.0-3.el7.x86_64.rpm librabbitmq-debuginfo-0.8.0-3.el7.i686.rpm librabbitmq-debuginfo-0.8.0-3.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: librabbitmq-debuginfo-0.8.0-3.el7.ppc.rpm librabbitmq-debuginfo-0.8.0-3.el7.ppc64.rpm librabbitmq-devel-0.8.0-3.el7.ppc.rpm librabbitmq-devel-0.8.0-3.el7.ppc64.rpm librabbitmq-examples-0.8.0-3.el7.ppc64.rpm
ppc64le: librabbitmq-debuginfo-0.8.0-3.el7.ppc64le.rpm librabbitmq-devel-0.8.0-3.el7.ppc64le.rpm librabbitmq-examples-0.8.0-3.el7.ppc64le.rpm
s390x: librabbitmq-debuginfo-0.8.0-3.el7.s390.rpm librabbitmq-debuginfo-0.8.0-3.el7.s390x.rpm librabbitmq-devel-0.8.0-3.el7.s390.rpm librabbitmq-devel-0.8.0-3.el7.s390x.rpm librabbitmq-examples-0.8.0-3.el7.s390x.rpm
x86_64: librabbitmq-debuginfo-0.8.0-3.el7.i686.rpm librabbitmq-debuginfo-0.8.0-3.el7.x86_64.rpm librabbitmq-devel-0.8.0-3.el7.i686.rpm librabbitmq-devel-0.8.0-3.el7.x86_64.rpm librabbitmq-examples-0.8.0-3.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: librabbitmq-0.8.0-3.el7.src.rpm
x86_64: librabbitmq-0.8.0-3.el7.i686.rpm librabbitmq-0.8.0-3.el7.x86_64.rpm librabbitmq-debuginfo-0.8.0-3.el7.i686.rpm librabbitmq-debuginfo-0.8.0-3.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: librabbitmq-debuginfo-0.8.0-3.el7.i686.rpm librabbitmq-debuginfo-0.8.0-3.el7.x86_64.rpm librabbitmq-devel-0.8.0-3.el7.i686.rpm librabbitmq-devel-0.8.0-3.el7.x86_64.rpm librabbitmq-examples-0.8.0-3.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:3949-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3949
Issued Date: : 2020-09-29
CVE Names: CVE-2019-18609

Topic

An update for librabbitmq is now available for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64

Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64

Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64

Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64

Red Hat Enterprise Linux Workstation (v. 7) - x86_64

Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64


Bugs Fixed

1786646 - CVE-2019-18609 librabbitmq: integer overflow in amqp_handle_input in amqp_connection.c leads to heap-based buffer overflow


Related News