Name | CVE-2024-10525 |
Description | In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
mosquitto (PTS) | jessie, jessie (lts) | 1.3.4-2+deb8u4 | vulnerable |
stretch (security), stretch (lts), stretch | 1.4.10-3+deb9u5 | vulnerable | |
buster (security), buster, buster (lts) | 1.5.7-1+deb10u1 | vulnerable | |
bullseye (security), bullseye | 2.0.11-1+deb11u1 | vulnerable | |
bookworm (security), bookworm | 2.0.11-1.2+deb12u1 | vulnerable | |
sid, trixie | 2.0.20-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
mosquitto | source | (unstable) | 2.0.20-1 |
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/190
https://mosquitto.org/blog/2024/10/version-2-0-19-released/
https://github.com/eclipse-mosquitto/mosquitto/commit/8ab20b4ba4204fdcdec78cb4d9f03c944a6e0e1c (v2.0.19)