Arch Linux Security Advisory ASA-202106-17
=========================================
Severity: Medium
Date    : 2021-06-01
CVE-ID  : CVE-2021-22116
Package : rabbitmq
Type    : denial of service
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1966

Summary
======
The package rabbitmq before version 3.8.16-1 is vulnerable to denial of
service.

Resolution
=========
Upgrade to 3.8.16-1.

# pacman -Syu "rabbitmq>=3.8.16-1"

The problem has been fixed upstream in version 3.8.16.

Workaround
=========
None.

Description
==========
RabbitMQ all versions prior to 3.8.16 are prone to a denial of service
vulnerability due to improper input validation in AMQP 1.0 client
connection endpoint.

An attacker can exploit the vulnerability by sending malicious AMQP
messages to the target RabbitMQ instance having the AMQP 1.0 plugin
enabled.

Impact
=====
A remote attacker could crash the RabbitMQ server through crafted AMQP
messages.

References
=========
https://tanzu.vmware.com/security/cve-2021-22116
https://security.archlinux.org/CVE-2021-22116

ArchLinux: 202106-17: rabbitmq: denial of service

June 3, 2021

Summary

RabbitMQ all versions prior to 3.8.16 are prone to a denial of service vulnerability due to improper input validation in AMQP 1.0 client connection endpoint. An attacker can exploit the vulnerability by sending malicious AMQP messages to the target RabbitMQ instance having the AMQP 1.0 plugin enabled.

Resolution

Upgrade to 3.8.16-1. # pacman -Syu "rabbitmq>=3.8.16-1"
The problem has been fixed upstream in version 3.8.16.

References

https://tanzu.vmware.com/security/cve-2021-22116 https://security.archlinux.org/CVE-2021-22116

Severity
Package : rabbitmq
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-1966

Workaround

None.

Related News