| Name | CVE-2024-10525 |
| Description | In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DLA-4059-1 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| mosquitto (PTS) | bullseye | 2.0.11-1+deb11u1 | vulnerable |
| bullseye (security) | 2.0.11-1+deb11u2 | fixed | |
| bookworm | 2.0.11-1.2+deb12u2 | fixed | |
| bookworm (security) | 2.0.11-1.2+deb12u1 | vulnerable | |
| trixie | 2.0.21-1 | fixed | |
| forky, sid | 2.0.22-3 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| mosquitto | source | bullseye | 2.0.11-1+deb11u2 | DLA-4059-1 | ||
| mosquitto | source | bookworm | 2.0.11-1.2+deb12u2 | |||
| mosquitto | source | (unstable) | 2.0.20-1 |
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/190
https://mosquitto.org/blog/2024/10/version-2-0-19-released/
https://github.com/eclipse-mosquitto/mosquitto/commit/8ab20b4ba4204fdcdec78cb4d9f03c944a6e0e1c (v2.0.19)