Security update for rabbitmq-server313

Announcement ID: SUSE-SU-2025:01548-1
Release Date: 2025-06-11T12:47:31Z
Rating: moderate
References:
Cross-References:
CVSS scores:
  • CVE-2025-30219 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
  • CVE-2025-30219 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L
  • CVE-2025-30219 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L
Affected Products:
  • Server Applications Module 15-SP7
  • SUSE Linux Enterprise Real Time 15 SP7
  • SUSE Linux Enterprise Server 15 SP7
  • SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability and has two security fixes can now be installed.

Description:

This update for rabbitmq-server313 fixes the following issues:

  • CVE-2025-30219: incorrectly escaped virtual hostname present in error message could lead to XSS attack. (bsc#1240071)

Non-security fixes:

  • Require rabbitmq-server313-plugins rather then rabbitmq-server-plugins. (bsc#1231656, bsc#1234763)

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • Server Applications Module 15-SP7
    zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-1548=1

Package List:

  • Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
    • rabbitmq-server313-3.13.1-150600.13.8.1
    • rabbitmq-server313-plugins-3.13.1-150600.13.8.1
    • erlang-rabbitmq-client313-3.13.1-150600.13.8.1
  • Server Applications Module 15-SP7 (noarch)
    • rabbitmq-server313-bash-completion-3.13.1-150600.13.8.1
    • rabbitmq-server313-zsh-completion-3.13.1-150600.13.8.1

References: