Debian Package Tracker
Register | Log in
Subscribe

librabbitmq

Choose email to subscribe with

general
  • source: librabbitmq (main)
  • version: 0.9.0-0.2
  • maintainer: Michael Fladischer (DMD)
  • uploaders: Brian May [DMD]
  • arch: any
  • std-ver: 3.9.8
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.5.2-2
  • o-o-sec: 0.5.2-2+deb8u1
  • oldstable: 0.8.0-1
  • stable: 0.9.0-0.2
  • testing: 0.9.0-0.2
  • unstable: 0.9.0-0.2
versioned links
  • 0.5.2-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.5.2-2+deb8u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.8.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.9.0-0.2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • amqp-tools (1 bugs: 0, 1, 0, 0)
  • librabbitmq-dev
  • librabbitmq4
action needed
A new upstream version is available: 0.10.0 high
A new upstream version 0.10.0 is available, you should consider packaging it.
Created: 2019-12-06 Last update: 2019-12-12 06:18
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2018-12-18 Last update: 2019-12-11 19:50
1 security issue in bullseye high
There is 1 open security issue in bullseye.
1 important issue:
  • CVE-2019-18609: An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition is then carried on to a memcpy function that copies too much data into a heap buffer.
Please fix it.
Created: 2019-12-02 Last update: 2019-12-10 20:39
1 security issue in sid high
There is 1 open security issue in sid.
1 important issue:
  • CVE-2019-18609: An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition is then carried on to a memcpy function that copies too much data into a heap buffer.
Please fix it.
Created: 2019-12-02 Last update: 2019-12-10 20:39
Standards version of the package is outdated. high
The package is severely out of date with respect to the Debian Policy. The package should be updated to follow the last version of Debian Policy (Standards-Version 4.4.1 instead of 3.9.8).
Created: 2018-04-16 Last update: 2019-09-29 23:41
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2018-09-11 Last update: 2019-12-12 09:01
lintian reports 2 warnings normal
Lintian reports 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2019-08-31 Last update: 2019-10-13 00:13
1 ignored security issue in buster low
There is 1 open security issue in buster.
1 issue skipped by the security teams:
  • CVE-2019-18609: An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition is then carried on to a memcpy function that copies too much data into a heap buffer.
Please fix it.
Created: 2019-12-02 Last update: 2019-12-10 20:39
1 ignored security issue in stretch low
There is 1 open security issue in stretch.
1 issue skipped by the security teams:
  • CVE-2019-18609: An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition is then carried on to a memcpy function that copies too much data into a heap buffer.
Please fix it.
Created: 2019-12-02 Last update: 2019-12-10 20:39
news
[rss feed]
  • [2019-12-06] Accepted librabbitmq 0.5.2-2+deb8u1 (source amd64) into oldoldstable (Chris Lamb)
  • [2018-12-23] librabbitmq 0.9.0-0.2 MIGRATED to testing (Debian testing watch)
  • [2018-12-17] Accepted librabbitmq 0.9.0-0.2 (source) into unstable (Gianfranco Costamagna)
  • [2018-10-01] Accepted librabbitmq 0.9.0-0.1 (source amd64) into unstable (Ondřej Surý)
  • [2016-07-29] librabbitmq 0.8.0-1 MIGRATED to testing (Debian testing watch)
  • [2016-07-24] Accepted librabbitmq 0.8.0-1 (source amd64) into unstable (Brian May)
  • [2015-11-26] librabbitmq 0.7.1-1 MIGRATED to testing (Britney)
  • [2015-11-20] Accepted librabbitmq 0.7.1-1 (source amd64) into unstable, unstable (Michael Fladischer)
  • [2014-11-20] librabbitmq 0.5.2-2 MIGRATED to testing (Britney)
  • [2014-11-14] Accepted librabbitmq 0.5.2-2 (source amd64) into unstable (Michael Fladischer) (signed by: Patrick Matthäi)
  • [2014-09-23] librabbitmq 0.5.2-1 MIGRATED to testing (Britney)
  • [2014-09-17] Accepted librabbitmq 0.5.2-1 (source amd64) into unstable (Michael Fladischer) (signed by: Patrick Matthäi)
  • [2014-08-20] Accepted librabbitmq 0.5.1-1 (source amd64) into unstable (Michael Fladischer) (signed by: Patrick Matthäi)
  • [2014-08-11] Accepted librabbitmq 0.5.0-1 (source amd64) into unstable (Brian May)
  • [2013-11-19] librabbitmq 0.4.1-1 MIGRATED to testing (Debian testing watch)
  • [2013-11-08] Accepted librabbitmq 0.4.1-1 (source amd64) (Michael Fladischer) (signed by: Patrick Matthäi)
  • [2013-09-04] librabbitmq 0.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2013-06-18] Accepted librabbitmq 0.3.0-1 (source amd64) (Michael Fladischer) (signed by: Patrick Matthäi)
  • [2011-02-06] librabbitmq 0.0.1.hg216-1 MIGRATED to testing (Debian testing watch)
  • [2011-01-24] Accepted librabbitmq 0.0.1.hg216-1 (source amd64) (Monty Taylor) (signed by: LI Daobing)
bugs [bug history graph]
  • all: 2
  • RC: 0
  • I&N: 2
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • buildd: logs, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.9.0-0.2

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing