<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for rabbitmq-server</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2026:20082-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-01-22T13:47:27Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-01-22T13:47:27Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-01-22T13:47:27Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for rabbitmq-server</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for rabbitmq-server fixes the following issues:

Changes in rabbitmq-server:

Update to 4.1.5:

* Highlights

  - Khepri, an alternative schema data store developed to replace Mnesia,
    has matured and is now fully supported (it previously was an experimental feature)
  - AMQP 1.0 is now a core protocol that is always enabled. Its plugin is now a no-op that only exists to simplify upgrades.
  - The AMQP 1.0 implementation is now significantly more efficient: its peak throughput is more than double than that of 3.13.x
    on some workloads
  - Efficient sub-linear quorum queue recovery on node startup using checkpoints
  - Quorum queues now support priorities (but not exactly the same way as classic queues)
  - AMQP 1.0 clients now can manage topologies similarly to how AMQP 0-9-1 clients do it
  - The AMQP 1.0 convention (address format) used for interacting with with AMQP 0-9-1 entities is now easier to reason about
  - Mirroring (replication) of classic queues was removed after several years of deprecation. For replicated messaging data types,
    use quorum queues and/or streams. Non-replicated classic queues remain and their development continues
  - Classic queue storage efficiency improvements, in particular recovery time and storage of multi-MiB messages
  - Nodes with multiple enabled plugins and little on disk data to recover now start up to 20-30% faster
  - New exchange type: Local Random Exchange
  - Quorum queue log reads are now offloaded to channels (sessions, connections).
  - Initial Support for AMQP 1.0 Filter Expressions
  - Feature Flags Quality of Life Improvements
  - rabbitmqadmin v2

* Breaking Changes

  - Before a client connection can negotiate a maximum frame size (frame_max), it must authenticate
    successfully. Before the authenticated phase, a special lower frame_max value
    is used.
  - With this release, the value was increased from the original 4096 bytes to 8192
    to accommodate larger JWT tokens.
  - amqplib is a popular client library that has been using
    a low frame_max default of 4096. Its users must upgrade to a compatible version
    (starting with 0.10.7) or explicitly use a higher frame_max.
    amqplib versions older than 0.10.7 will not be able to connect to
    RabbitMQ 4.1.0 and later versions due to the initial AMQP 0-9-1 maximum frame size
    increase covered above.
  - The default MQTT Maximum Packet Size changed from 256 MiB to 16 MiB.
  - The following rabbitmq.conf settings are unsupported:

    - cluster_formation.etcd.ssl_options.fail_if_no_peer_cert
    - cluster_formation.etcd.ssl_options.dh
    - cluster_formation.etcd.ssl_options.dhfile

  - Classic Queues is Now a Non-Replicated Queue Type
  - Quorum Queues Now Have a Default Redelivery Limit
  - Up to RabbitMQ 3.13, when an AMQP 0.9.1 client (re-)published a message to RabbitMQ, RabbitMQ interpreted the
  - AMQP 0.9.1 x-death header in the published message's basic_message.content.properties.headers field.
  - RabbitMQ 4.x will not interpret this x-death header anymore when clients (re-)publish a message.
  - CQv1 Storage Implementation was Removed
  - Settings cluster_formation.randomized_startup_delay_range.* were Removed
  - Several Disk I/O-Related Metrics were Removed
  - Default Maximum Message Size Reduced to 16 MiB
  - RabbitMQ 3.13 rabbitmq.conf setting rabbitmq_amqp1_0.default_vhost is unsupported in RabbitMQ 4.0.
  - RabbitMQ 3.13 rabbitmq.conf settings mqtt.default_user, mqtt.default_password,
    and amqp1_0.default_user are unsupported in RabbitMQ 4.0.
  - Starting with Erlang 26, client side TLS peer certificate chain verification settings are enabled by default in most contexts:
    from federation links to shovels to TLS-enabled LDAP client connections.
  - RabbitMQ Shovels will be able connect to a RabbitMQ 4.0 node via AMQP 1.0 only when the Shovel runs on a RabbitMQ node &gt;= 3.13.7.

    * See https://github.com/rabbitmq/rabbitmq-server/releases/tag/v4.0.1
    * and https://github.com/rabbitmq/rabbitmq-server/releases/tag/v4.1.0 for more info

- Restore SLES logrotate file, (bsc#1246091)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Leap-16.0-171</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246091</URL>
      <Description>SUSE Bug 1246091</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-30219/</URL>
      <Description>SUSE CVE CVE-2025-30219 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 16.0">
      <Branch Type="Product Name" Name="openSUSE Leap 16.0">
        <FullProductName ProductID="openSUSE Leap 16.0">openSUSE Leap 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="erlang-rabbitmq-client-4.1.5-160000.1.1">
      <FullProductName ProductID="erlang-rabbitmq-client-4.1.5-160000.1.1">erlang-rabbitmq-client-4.1.5-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rabbitmq-server-4.1.5-160000.1.1">
      <FullProductName ProductID="rabbitmq-server-4.1.5-160000.1.1">rabbitmq-server-4.1.5-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rabbitmq-server-bash-completion-4.1.5-160000.1.1">
      <FullProductName ProductID="rabbitmq-server-bash-completion-4.1.5-160000.1.1">rabbitmq-server-bash-completion-4.1.5-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rabbitmq-server-plugins-4.1.5-160000.1.1">
      <FullProductName ProductID="rabbitmq-server-plugins-4.1.5-160000.1.1">rabbitmq-server-plugins-4.1.5-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rabbitmq-server-zsh-completion-4.1.5-160000.1.1">
      <FullProductName ProductID="rabbitmq-server-zsh-completion-4.1.5-160000.1.1">rabbitmq-server-zsh-completion-4.1.5-160000.1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="erlang-rabbitmq-client-4.1.5-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1">erlang-rabbitmq-client-4.1.5-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="rabbitmq-server-4.1.5-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1">rabbitmq-server-4.1.5-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="rabbitmq-server-bash-completion-4.1.5-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:rabbitmq-server-bash-completion-4.1.5-160000.1.1">rabbitmq-server-bash-completion-4.1.5-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="rabbitmq-server-plugins-4.1.5-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1">rabbitmq-server-plugins-4.1.5-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="rabbitmq-server-zsh-completion-4.1.5-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:rabbitmq-server-zsh-completion-4.1.5-160000.1.1">rabbitmq-server-zsh-completion-4.1.5-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">RabbitMQ is a messaging and streaming broker. Versions prior to 4.0.3 are vulnerable to a sophisticated attack that could modify virtual host name on disk and then make it unrecoverable (with other on disk file modifications) can lead to arbitrary JavaScript code execution in the browsers of management UI users. When a virtual host on a RabbitMQ node fails to start, recent versions
will display an error message (a notification) in the management UI. The error message includes virtual host name, which was not escaped prior to open source RabbitMQ 4.0.3 and Tanzu RabbitMQ 4.0.3, 3.13.8. An attack that both makes a virtual host fail to start and creates a new virtual host name with an XSS code snippet or changes the name of an existing virtual host on disk could trigger arbitrary JavaScript code execution in the management UI (the user's browser). Open source RabbitMQ `4.0.3` and Tanzu RabbitMQ `4.0.3` and `3.13.8` patch the issue.</Note>
    </Notes>
    <CVE>CVE-2025-30219</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:erlang-rabbitmq-client-4.1.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:rabbitmq-server-4.1.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:rabbitmq-server-bash-completion-4.1.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:rabbitmq-server-plugins-4.1.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:rabbitmq-server-zsh-completion-4.1.5-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-30219.html</URL>
        <Description>CVE-2025-30219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240071</URL>
        <Description>SUSE Bug 1240071</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
