CVE-2024-10525

NameCVE-2024-10525
DescriptionIn Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mosquitto (PTS)jessie, jessie (lts)1.3.4-2+deb8u4vulnerable
stretch (security), stretch (lts), stretch1.4.10-3+deb9u5vulnerable
buster (security), buster, buster (lts)1.5.7-1+deb10u1vulnerable
bullseye (security), bullseye2.0.11-1+deb11u1vulnerable
bookworm (security), bookworm2.0.11-1.2+deb12u1vulnerable
sid, trixie2.0.20-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mosquittosource(unstable)2.0.20-1

Notes

https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/190
https://mosquitto.org/blog/2024/10/version-2-0-19-released/
https://github.com/eclipse-mosquitto/mosquitto/commit/8ab20b4ba4204fdcdec78cb4d9f03c944a6e0e1c (v2.0.19)

Search for package or bug name: Reporting problems