OPENSUSE-SU-2026:20082-1

Vulnerability from csaf_opensuse - Published: 2026-01-22 13:47 - Updated: 2026-01-22 13:47
Summary
Security update for rabbitmq-server

Notes

Title of the patch
Security update for rabbitmq-server
Description of the patch
This update for rabbitmq-server fixes the following issues: Changes in rabbitmq-server: Update to 4.1.5: * Highlights - Khepri, an alternative schema data store developed to replace Mnesia, has matured and is now fully supported (it previously was an experimental feature) - AMQP 1.0 is now a core protocol that is always enabled. Its plugin is now a no-op that only exists to simplify upgrades. - The AMQP 1.0 implementation is now significantly more efficient: its peak throughput is more than double than that of 3.13.x on some workloads - Efficient sub-linear quorum queue recovery on node startup using checkpoints - Quorum queues now support priorities (but not exactly the same way as classic queues) - AMQP 1.0 clients now can manage topologies similarly to how AMQP 0-9-1 clients do it - The AMQP 1.0 convention (address format) used for interacting with with AMQP 0-9-1 entities is now easier to reason about - Mirroring (replication) of classic queues was removed after several years of deprecation. For replicated messaging data types, use quorum queues and/or streams. Non-replicated classic queues remain and their development continues - Classic queue storage efficiency improvements, in particular recovery time and storage of multi-MiB messages - Nodes with multiple enabled plugins and little on disk data to recover now start up to 20-30% faster - New exchange type: Local Random Exchange - Quorum queue log reads are now offloaded to channels (sessions, connections). - Initial Support for AMQP 1.0 Filter Expressions - Feature Flags Quality of Life Improvements - rabbitmqadmin v2 * Breaking Changes - Before a client connection can negotiate a maximum frame size (frame_max), it must authenticate successfully. Before the authenticated phase, a special lower frame_max value is used. - With this release, the value was increased from the original 4096 bytes to 8192 to accommodate larger JWT tokens. - amqplib is a popular client library that has been using a low frame_max default of 4096. Its users must upgrade to a compatible version (starting with 0.10.7) or explicitly use a higher frame_max. amqplib versions older than 0.10.7 will not be able to connect to RabbitMQ 4.1.0 and later versions due to the initial AMQP 0-9-1 maximum frame size increase covered above. - The default MQTT Maximum Packet Size changed from 256 MiB to 16 MiB. - The following rabbitmq.conf settings are unsupported: - cluster_formation.etcd.ssl_options.fail_if_no_peer_cert - cluster_formation.etcd.ssl_options.dh - cluster_formation.etcd.ssl_options.dhfile - Classic Queues is Now a Non-Replicated Queue Type - Quorum Queues Now Have a Default Redelivery Limit - Up to RabbitMQ 3.13, when an AMQP 0.9.1 client (re-)published a message to RabbitMQ, RabbitMQ interpreted the - AMQP 0.9.1 x-death header in the published message's basic_message.content.properties.headers field. - RabbitMQ 4.x will not interpret this x-death header anymore when clients (re-)publish a message. - CQv1 Storage Implementation was Removed - Settings cluster_formation.randomized_startup_delay_range.* were Removed - Several Disk I/O-Related Metrics were Removed - Default Maximum Message Size Reduced to 16 MiB - RabbitMQ 3.13 rabbitmq.conf setting rabbitmq_amqp1_0.default_vhost is unsupported in RabbitMQ 4.0. - RabbitMQ 3.13 rabbitmq.conf settings mqtt.default_user, mqtt.default_password, and amqp1_0.default_user are unsupported in RabbitMQ 4.0. - Starting with Erlang 26, client side TLS peer certificate chain verification settings are enabled by default in most contexts: from federation links to shovels to TLS-enabled LDAP client connections. - RabbitMQ Shovels will be able connect to a RabbitMQ 4.0 node via AMQP 1.0 only when the Shovel runs on a RabbitMQ node >= 3.13.7. * See https://github.com/rabbitmq/rabbitmq-server/releases/tag/v4.0.1 * and https://github.com/rabbitmq/rabbitmq-server/releases/tag/v4.1.0 for more info - Restore SLES logrotate file, (bsc#1246091)
Patchnames
openSUSE-Leap-16.0-171
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for rabbitmq-server",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for rabbitmq-server fixes the following issues:\n\nChanges in rabbitmq-server:\n\nUpdate to 4.1.5:\n\n* Highlights\n\n  - Khepri, an alternative schema data store developed to replace Mnesia,\n    has matured and is now fully supported (it previously was an experimental feature)\n  - AMQP 1.0 is now a core protocol that is always enabled. Its plugin is now a no-op that only exists to simplify upgrades.\n  - The AMQP 1.0 implementation is now significantly more efficient: its peak throughput is more than double than that of 3.13.x\n    on some workloads\n  - Efficient sub-linear quorum queue recovery on node startup using checkpoints\n  - Quorum queues now support priorities (but not exactly the same way as classic queues)\n  - AMQP 1.0 clients now can manage topologies similarly to how AMQP 0-9-1 clients do it\n  - The AMQP 1.0 convention (address format) used for interacting with with AMQP 0-9-1 entities is now easier to reason about\n  - Mirroring (replication) of classic queues was removed after several years of deprecation. For replicated messaging data types,\n    use quorum queues and/or streams. Non-replicated classic queues remain and their development continues\n  - Classic queue storage efficiency improvements, in particular recovery time and storage of multi-MiB messages\n  - Nodes with multiple enabled plugins and little on disk data to recover now start up to 20-30% faster\n  - New exchange type: Local Random Exchange\n  - Quorum queue log reads are now offloaded to channels (sessions, connections).\n  - Initial Support for AMQP 1.0 Filter Expressions\n  - Feature Flags Quality of Life Improvements\n  - rabbitmqadmin v2\n\n* Breaking Changes\n\n  - Before a client connection can negotiate a maximum frame size (frame_max), it must authenticate\n    successfully. Before the authenticated phase, a special lower frame_max value\n    is used.\n  - With this release, the value was increased from the original 4096 bytes to 8192\n    to accommodate larger JWT tokens.\n  - amqplib is a popular client library that has been using\n    a low frame_max default of 4096. Its users must upgrade to a compatible version\n    (starting with 0.10.7) or explicitly use a higher frame_max.\n    amqplib versions older than 0.10.7 will not be able to connect to\n    RabbitMQ 4.1.0 and later versions due to the initial AMQP 0-9-1 maximum frame size\n    increase covered above.\n  - The default MQTT Maximum Packet Size changed from 256 MiB to 16 MiB.\n  - The following rabbitmq.conf settings are unsupported:\n\n    - cluster_formation.etcd.ssl_options.fail_if_no_peer_cert\n    - cluster_formation.etcd.ssl_options.dh\n    - cluster_formation.etcd.ssl_options.dhfile\n\n  - Classic Queues is Now a Non-Replicated Queue Type\n  - Quorum Queues Now Have a Default Redelivery Limit\n  - Up to RabbitMQ 3.13, when an AMQP 0.9.1 client (re-)published a message to RabbitMQ, RabbitMQ interpreted the\n  - AMQP 0.9.1 x-death header in the published message\u0027s basic_message.content.properties.headers field.\n  - RabbitMQ 4.x will not interpret this x-death header anymore when clients (re-)publish a message.\n  - CQv1 Storage Implementation was Removed\n  - Settings cluster_formation.randomized_startup_delay_range.* were Removed\n  - Several Disk I/O-Related Metrics were Removed\n  - Default Maximum Message Size Reduced to 16 MiB\n  - RabbitMQ 3.13 rabbitmq.conf setting rabbitmq_amqp1_0.default_vhost is unsupported in RabbitMQ 4.0.\n  - RabbitMQ 3.13 rabbitmq.conf settings mqtt.default_user, mqtt.default_password,\n    and amqp1_0.default_user are unsupported in RabbitMQ 4.0.\n  - Starting with Erlang 26, client side TLS peer certificate chain verification settings are enabled by default in most contexts:\n    from federation links to shovels to TLS-enabled LDAP client connections.\n  - RabbitMQ Shovels will be able connect to a RabbitMQ 4.0 node via AMQP 1.0 only when the Shovel runs on a RabbitMQ node \u003e= 3.13.7.\n\n    * See https://github.com/rabbitmq/rabbitmq-server/releases/tag/v4.0.1\n    * and https://github.com/rabbitmq/rabbitmq-server/releases/tag/v4.1.0 for more info\n\n- Restore SLES logrotate file, (bsc#1246091)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Leap-16.0-171",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20082-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1246091",
        "url": "https://bugzilla.suse.com/1246091"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-30219 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-30219/"
      }
    ],
    "title": "Security update for rabbitmq-server",
    "tracking": {
      "current_release_date": "2026-01-22T13:47:27Z",
      "generator": {
        "date": "2026-01-22T13:47:27Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2026:20082-1",
      "initial_release_date": "2026-01-22T13:47:27Z",
      "revision_history": [
        {
          "date": "2026-01-22T13:47:27Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "erlang-rabbitmq-client-4.1.5-160000.1.1.aarch64",
                "product": {
                  "name": "erlang-rabbitmq-client-4.1.5-160000.1.1.aarch64",
                  "product_id": "erlang-rabbitmq-client-4.1.5-160000.1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "rabbitmq-server-4.1.5-160000.1.1.aarch64",
                "product": {
                  "name": "rabbitmq-server-4.1.5-160000.1.1.aarch64",
                  "product_id": "rabbitmq-server-4.1.5-160000.1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "rabbitmq-server-plugins-4.1.5-160000.1.1.aarch64",
                "product": {
                  "name": "rabbitmq-server-plugins-4.1.5-160000.1.1.aarch64",
                  "product_id": "rabbitmq-server-plugins-4.1.5-160000.1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rabbitmq-server-bash-completion-4.1.5-160000.1.1.noarch",
                "product": {
                  "name": "rabbitmq-server-bash-completion-4.1.5-160000.1.1.noarch",
                  "product_id": "rabbitmq-server-bash-completion-4.1.5-160000.1.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "rabbitmq-server-zsh-completion-4.1.5-160000.1.1.noarch",
                "product": {
                  "name": "rabbitmq-server-zsh-completion-4.1.5-160000.1.1.noarch",
                  "product_id": "rabbitmq-server-zsh-completion-4.1.5-160000.1.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "erlang-rabbitmq-client-4.1.5-160000.1.1.ppc64le",
                "product": {
                  "name": "erlang-rabbitmq-client-4.1.5-160000.1.1.ppc64le",
                  "product_id": "erlang-rabbitmq-client-4.1.5-160000.1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "rabbitmq-server-4.1.5-160000.1.1.ppc64le",
                "product": {
                  "name": "rabbitmq-server-4.1.5-160000.1.1.ppc64le",
                  "product_id": "rabbitmq-server-4.1.5-160000.1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "rabbitmq-server-plugins-4.1.5-160000.1.1.ppc64le",
                "product": {
                  "name": "rabbitmq-server-plugins-4.1.5-160000.1.1.ppc64le",
                  "product_id": "rabbitmq-server-plugins-4.1.5-160000.1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "erlang-rabbitmq-client-4.1.5-160000.1.1.s390x",
                "product": {
                  "name": "erlang-rabbitmq-client-4.1.5-160000.1.1.s390x",
                  "product_id": "erlang-rabbitmq-client-4.1.5-160000.1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "rabbitmq-server-4.1.5-160000.1.1.s390x",
                "product": {
                  "name": "rabbitmq-server-4.1.5-160000.1.1.s390x",
                  "product_id": "rabbitmq-server-4.1.5-160000.1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "rabbitmq-server-plugins-4.1.5-160000.1.1.s390x",
                "product": {
                  "name": "rabbitmq-server-plugins-4.1.5-160000.1.1.s390x",
                  "product_id": "rabbitmq-server-plugins-4.1.5-160000.1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "erlang-rabbitmq-client-4.1.5-160000.1.1.x86_64",
                "product": {
                  "name": "erlang-rabbitmq-client-4.1.5-160000.1.1.x86_64",
                  "product_id": "erlang-rabbitmq-client-4.1.5-160000.1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "rabbitmq-server-4.1.5-160000.1.1.x86_64",
                "product": {
                  "name": "rabbitmq-server-4.1.5-160000.1.1.x86_64",
                  "product_id": "rabbitmq-server-4.1.5-160000.1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "rabbitmq-server-plugins-4.1.5-160000.1.1.x86_64",
                "product": {
                  "name": "rabbitmq-server-plugins-4.1.5-160000.1.1.x86_64",
                  "product_id": "rabbitmq-server-plugins-4.1.5-160000.1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 16.0",
                "product": {
                  "name": "openSUSE Leap 16.0",
                  "product_id": "openSUSE Leap 16.0"
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "erlang-rabbitmq-client-4.1.5-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.aarch64"
        },
        "product_reference": "erlang-rabbitmq-client-4.1.5-160000.1.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "erlang-rabbitmq-client-4.1.5-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.ppc64le"
        },
        "product_reference": "erlang-rabbitmq-client-4.1.5-160000.1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "erlang-rabbitmq-client-4.1.5-160000.1.1.s390x as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.s390x"
        },
        "product_reference": "erlang-rabbitmq-client-4.1.5-160000.1.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "erlang-rabbitmq-client-4.1.5-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.x86_64"
        },
        "product_reference": "erlang-rabbitmq-client-4.1.5-160000.1.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-4.1.5-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.aarch64"
        },
        "product_reference": "rabbitmq-server-4.1.5-160000.1.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-4.1.5-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.ppc64le"
        },
        "product_reference": "rabbitmq-server-4.1.5-160000.1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-4.1.5-160000.1.1.s390x as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.s390x"
        },
        "product_reference": "rabbitmq-server-4.1.5-160000.1.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-4.1.5-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.x86_64"
        },
        "product_reference": "rabbitmq-server-4.1.5-160000.1.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-bash-completion-4.1.5-160000.1.1.noarch as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:rabbitmq-server-bash-completion-4.1.5-160000.1.1.noarch"
        },
        "product_reference": "rabbitmq-server-bash-completion-4.1.5-160000.1.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-plugins-4.1.5-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.aarch64"
        },
        "product_reference": "rabbitmq-server-plugins-4.1.5-160000.1.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-plugins-4.1.5-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.ppc64le"
        },
        "product_reference": "rabbitmq-server-plugins-4.1.5-160000.1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-plugins-4.1.5-160000.1.1.s390x as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.s390x"
        },
        "product_reference": "rabbitmq-server-plugins-4.1.5-160000.1.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-plugins-4.1.5-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.x86_64"
        },
        "product_reference": "rabbitmq-server-plugins-4.1.5-160000.1.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-zsh-completion-4.1.5-160000.1.1.noarch as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:rabbitmq-server-zsh-completion-4.1.5-160000.1.1.noarch"
        },
        "product_reference": "rabbitmq-server-zsh-completion-4.1.5-160000.1.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-30219",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-30219"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "RabbitMQ is a messaging and streaming broker. Versions prior to 4.0.3 are vulnerable to a sophisticated attack that could modify virtual host name on disk and then make it unrecoverable (with other on disk file modifications) can lead to arbitrary JavaScript code execution in the browsers of management UI users. When a virtual host on a RabbitMQ node fails to start, recent versions\nwill display an error message (a notification) in the management UI. The error message includes virtual host name, which was not escaped prior to open source RabbitMQ 4.0.3 and Tanzu RabbitMQ 4.0.3, 3.13.8. An attack that both makes a virtual host fail to start and creates a new virtual host name with an XSS code snippet or changes the name of an existing virtual host on disk could trigger arbitrary JavaScript code execution in the management UI (the user\u0027s browser). Open source RabbitMQ `4.0.3` and Tanzu RabbitMQ `4.0.3` and `3.13.8` patch the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.aarch64",
          "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.s390x",
          "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.x86_64",
          "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.aarch64",
          "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.s390x",
          "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.x86_64",
          "openSUSE Leap 16.0:rabbitmq-server-bash-completion-4.1.5-160000.1.1.noarch",
          "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.aarch64",
          "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.s390x",
          "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.x86_64",
          "openSUSE Leap 16.0:rabbitmq-server-zsh-completion-4.1.5-160000.1.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-30219",
          "url": "https://www.suse.com/security/cve/CVE-2025-30219"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240071 for CVE-2025-30219",
          "url": "https://bugzilla.suse.com/1240071"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.aarch64",
            "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.s390x",
            "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.x86_64",
            "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.aarch64",
            "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.s390x",
            "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.x86_64",
            "openSUSE Leap 16.0:rabbitmq-server-bash-completion-4.1.5-160000.1.1.noarch",
            "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.aarch64",
            "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.s390x",
            "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.x86_64",
            "openSUSE Leap 16.0:rabbitmq-server-zsh-completion-4.1.5-160000.1.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.aarch64",
            "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.s390x",
            "openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1.x86_64",
            "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.aarch64",
            "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.s390x",
            "openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1.x86_64",
            "openSUSE Leap 16.0:rabbitmq-server-bash-completion-4.1.5-160000.1.1.noarch",
            "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.aarch64",
            "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.s390x",
            "openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1.x86_64",
            "openSUSE Leap 16.0:rabbitmq-server-zsh-completion-4.1.5-160000.1.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-22T13:47:27Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-30219"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…