CVE-2023-46118

NameCVE-2023-46118
DescriptionRabbitMQ is a multi-protocol messaging and streaming broker. HTTP API did not enforce an HTTP request body limit, making it vulnerable for denial of service (DoS) attacks with very large messages. An authenticated user with sufficient credentials can publish a very large messages over the HTTP API and cause target node to be terminated by an "out-of-memory killer"-like mechanism. This vulnerability has been patched in versions 3.11.24 and 3.12.7.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3687-1, DSA-5571-1
Debian Bugs1056723

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rabbitmq-server (PTS)buster3.7.8-4vulnerable
buster (security)3.8.2-1+deb10u2fixed
bullseye (security), bullseye3.8.9-3+deb11u1fixed
bookworm, bookworm (security)3.10.8-1.1+deb12u1fixed
sid, trixie3.10.8-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rabbitmq-serversourcebuster3.8.2-1+deb10u2DLA-3687-1
rabbitmq-serversourcebullseye3.8.9-3+deb11u1DSA-5571-1
rabbitmq-serversourcebookworm3.10.8-1.1+deb12u1DSA-5571-1
rabbitmq-serversource(unstable)3.10.8-31056723

Notes

https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-w6cq-9cf4-gqpg
https://github.com/rabbitmq/rabbitmq-server/pull/9708

Search for package or bug name: Reporting problems