--
You received this message because you are subscribed to the Google Groups "rabbitmq-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to rabbitmq-user...@googlegroups.com.
To view this discussion on the web, visit https://groups.google.com/d/msgid/rabbitmq-users/b53f4090-9eeb-4c7d-9d50-1be3513ba7e6n%40googlegroups.com.
Hi Marco,
How are you deploying RabbitMQ? None of these vulnerabilities affect the RabbitMQ server. Most of these seem to be for an old golang installation, which is not used by the RabbitMQ server. The OpenSSL vulnerabilities will not affect Erlang since it uses its own TLS implementation using OpenSSL cryptographic primitives and Erlang does not try to use SM2. systemd (CVE-2021-33910) is a part of the operating system itself, and RabbitMQ has no dependency on using a particular version (or any at all, depending on the installation).
I strongly recommend patching these by updating Go, OpenSSL, and systemd, and I do recommend upgrading RabbitMQ to get the bug fixes and features from the last year and a half, but these CVEs are not issues with RabbitMQ itself.
Hope this helps,
Adam
From: rabbitm...@googlegroups.com <rabbitm...@googlegroups.com>
On Behalf Of Marco Schmucki
Sent: Wednesday, February 2, 2022 9:39
To: rabbitmq-users <rabbitm...@googlegroups.com>
Subject: RabbitMQ vulnerabilities
Hi all
We're running RabbitMQ version 3.8.9 and have some security vulnerabilities (see excel-sheet in the attachment).
--> Are these security issues fixed with the latest&greatest RabbitMQ version (3.9.13)?
Many thanks for your feedback.
Best regards,
Marco.
--
You received this message because you are subscribed to a topic in the Google Groups "rabbitmq-users" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/rabbitmq-users/KryKieu4btg/unsubscribe.
To unsubscribe from this group and all its topics, send an email to rabbitmq-user...@googlegroups.com.
To view this discussion on the web, visit https://groups.google.com/d/msgid/rabbitmq-users/SJ0PR05MB732766220D6FE249A08B51A8A5289%40SJ0PR05MB7327.namprd05.prod.outlook.com.