Bugzilla – Bug 1216583
VUL-0: CVE-2023-46120: rabbitmq-java-client: maxBodyLebgth was not used when receiving Message objects
Last modified: 2024-03-05 09:19:57 UTC
The RabbitMQ Java client library allows Java and JVM-based applications to connect to and interact with RabbitMQ nodes. `maxBodyLebgth` was not used when receiving Message objects. Attackers could send a very large Message causing a memory overflow and triggering an OOM Error. Users of RabbitMQ may suffer from DoS attacks from RabbitMQ Java client which will ultimately exhaust the memory of the consumer. This vulnerability was patched in version 5.18.0. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46120
We are on version 3.5.0, also on Factory. - openSUSE:Backports:SLE-15-SP4 - openSUSE:Backports:SLE-15-SP5 - openSUSE:Backports:SLE-15-SP6 The code evolved over the time and the available patch is not directly applicable. From what I see in old code has no `maxBodyLebgth` protection.
Factory has been upgraded to 5.20.0. Not sure how the backports fetch that. But from our side, it is fixed. I only submitted a change in *changes file to mention this bug and CVE.