<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="../../assets/xml/rss.xsl" media="all"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Eclipse Mosquitto (Posts about Security)</title><link>https://mosquitto.org/</link><description></description><atom:link href="https://mosquitto.org/blog/categories/security.xml" rel="self" type="application/rss+xml"></atom:link><language>en</language><copyright>Contents © 2026 &lt;a href="mailto:roger@atchoo.org"&gt;Mosquitto Project&lt;/a&gt; </copyright><lastBuildDate>Mon, 02 Feb 2026 17:08:20 GMT</lastBuildDate><generator>Nikola (getnikola.com)</generator><docs>http://blogs.law.harvard.edu/tech/rss</docs><item><title>Version 1.5.6 released</title><link>https://mosquitto.org/blog/2019/02/version-1-5-6-released/</link><dc:creator>Mosquitto Project</dc:creator><description>&lt;p&gt;Mosquitto 1.5.6 has been released to address three potential security vulnerabilities.&lt;/p&gt;
&lt;h2 id="cve-2018-12551"&gt;CVE-2018-12551&lt;/h2&gt;
&lt;p&gt;If Mosquitto is configured to use a password file for authentication, any
malformed data in the password file will be treated as valid. This typically
means that the malformed data becomes a username and no password. If this
occurs, clients can circumvent authentication and get access to the broker by
using the malformed username. In particular, a blank line will be treated as a
valid empty username. Other security measures are unaffected. &lt;strong&gt;Users who have
only used the &lt;code&gt;mosquitto_passwd&lt;/code&gt; utility to create and modify their password
files are unaffected by this vulnerability&lt;/strong&gt;. Affects version 1.0 to 1.5.5
inclusive.&lt;/p&gt;
&lt;p&gt;Patches for older versions are available at &lt;a href="https://mosquitto.org/files/cve/2018-12551"&gt;https://mosquitto.org/files/cve/2018-12551&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="cve-2018-12550"&gt;CVE-2018-12550&lt;/h2&gt;
&lt;p&gt;If an ACL file is empty, or has only blank lines or comments, then mosquitto
treats the ACL file as not being defined, which means that no topic access is
denied. Although denying access to all topics is not a useful configuration,
this behaviour is unexpected and could lead to access being incorrectly granted
in some circumstances. Affects versions 1.0 to 1.5.5 inclusive.&lt;/p&gt;
&lt;p&gt;Patches for older versions are available at &lt;a href="https://mosquitto.org/files/cve/2018-12550"&gt;https://mosquitto.org/files/cve/2018-12550&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="cve-2018-12546"&gt;CVE-2018-12546&lt;/h2&gt;
&lt;p&gt;If a client publishes a retained message to a topic that they have access to,
and then their access to that topic is revoked, the retained message will still
be delivered to future subscribers. This behaviour may be undesirable in some
applications, so a configuration option &lt;code&gt;check_retain_source&lt;/code&gt; has been
introduced to enforce checking of the retained message source on publish.&lt;/p&gt;
&lt;p&gt;Patches for older versions are available at &lt;a href="https://mosquitto.org/files/cve/2018-12546"&gt;https://mosquitto.org/files/cve/2018-12546&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="version-156-changes"&gt;Version 1.5.6 Changes&lt;/h2&gt;
&lt;p&gt;The list of other fixes addressed in version 1.5.6 is:&lt;/p&gt;
&lt;h3 id="broker"&gt;Broker&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Fixed comment handling for config options that have optional arguments.&lt;/li&gt;
&lt;li&gt;Improved documentation around bridge topic remapping.&lt;/li&gt;
&lt;li&gt;Handle mismatched handshakes (e.g. QoS1 PUBLISH with QoS2 reply) properly.&lt;/li&gt;
&lt;li&gt;Fix spaces not being allowed in the bridge &lt;code&gt;remote_username option&lt;/code&gt;. Closes
  &lt;a href="https://github.com/eclipse/mosquitto/issues/1131"&gt;#1131&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Allow broker to always restart on Windows when using &lt;code&gt;log_dest file&lt;/code&gt;. Closes
  &lt;a href="https://github.com/eclipse/mosquitto/issues/1080"&gt;#1080&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fix Will not being sent for Websockets clients. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/1143"&gt;#1143&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Windows: Fix possible crash when client disconnects. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/1137"&gt;#1137&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fixed durable clients being unable to receive messages when offline, when
  &lt;code&gt;per_listener_settings&lt;/code&gt; was set to true. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/1081"&gt;#1081&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Add log message for the case where a client is disconnected for sending a
  topic with invalid UTF-8. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/1144"&gt;#1144&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="library"&gt;Library&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Fix TLS connections not working over SOCKS.&lt;/li&gt;
&lt;li&gt;Don't clear SSL context when TLS connection is closed, meaning if a user
  provided an external SSL_CTX they have less chance of leaking references.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="build"&gt;Build&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Fix comparison of boolean values in CMake build. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/1101"&gt;#1101&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fix compilation when openssl deprecated APIs are not available.
  Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/1094"&gt;#1094&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Man pages can now be built on any system. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/1139"&gt;#1139&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><category>Releases</category><category>Security</category><guid>https://mosquitto.org/blog/2019/02/version-1-5-6-released/</guid><pubDate>Fri, 08 Feb 2019 13:00:00 GMT</pubDate></item><item><title>Security advisory: CVE-2018-12543</title><link>https://mosquitto.org/blog/2018/09/security-advisory-cve-2018-12543/</link><dc:creator>Mosquitto Project</dc:creator><description>&lt;p&gt;Mosquitto 1.5.3 has been released to address a security vulnerability. It also
includes other bug fixes.&lt;/p&gt;
&lt;h2 id="cve-2018-12543"&gt;CVE-2018-12543&lt;/h2&gt;
&lt;p&gt;A vulnerability exists in Mosquitto versions 1.5 to 1.5.2 inclusive, known as
&lt;a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12543"&gt;CVE-2018-12543&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;If a message received by the broker has a topic that begins with &lt;code&gt;$&lt;/code&gt;, but that
does not begin &lt;code&gt;$SYS&lt;/code&gt;, an assert is triggered that should otherwise not be
accessible, causing Mosquitto to exit.&lt;/p&gt;
&lt;p&gt;The issue is fixed in Mosquitto 1.5.3. Patches for older versions are
available at &lt;a href="https://mosquitto.org/files/cve/2018-12543"&gt;https://mosquitto.org/files/cve/2018-12543&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The fix addresses the problem by reverting a commit that intended to remove
some unused checks, but also stopped part of the topic hierarchy being created.&lt;/p&gt;
&lt;h2 id="version-153-changes"&gt;Version 1.5.3 Changes&lt;/h2&gt;
&lt;p&gt;The complete list of fixes addressed in version 1.5.3 is:&lt;/p&gt;
&lt;h3 id="security"&gt;Security&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Fix &lt;a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12543"&gt;CVE-2018-12543&lt;/a&gt;. If a message is sent to Mosquitto with a topic that
  begins with &lt;code&gt;$&lt;/code&gt;, but is not &lt;code&gt;$SYS&lt;/code&gt;, then an assert that should be unreachable
  is triggered and Mosquitto will exit.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="broker"&gt;Broker&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Elevate log level to warning for situation when socket limit is hit.&lt;/li&gt;
&lt;li&gt;Remove requirement to use &lt;code&gt;user root&lt;/code&gt; in snap package config files.&lt;/li&gt;
&lt;li&gt;Fix retained messages not sent by bridges on outgoing topics at the first
  connection. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/701"&gt;#701&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Documentation fixes. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/520"&gt;#520&lt;/a&gt;, &lt;a href="https://github.com/eclipse/mosquitto/issues/600"&gt;#600&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fix duplicate clients being added to by_id hash before the old client was
  removed. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/645"&gt;#645&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fix Windows version not starting if &lt;code&gt;include_dir&lt;/code&gt; did not contain any files.
  Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/566"&gt;#566&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="build"&gt;Build&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Various fixes to ease building.&lt;/li&gt;
&lt;/ul&gt;</description><category>Releases</category><category>Security</category><guid>https://mosquitto.org/blog/2018/09/security-advisory-cve-2018-12543/</guid><pubDate>Thu, 27 Sep 2018 09:36:19 GMT</pubDate></item><item><title>Version 1.6.6 released</title><link>https://mosquitto.org/blog/2019/09/version-1-6-6-released/</link><dc:creator>Mosquitto Project</dc:creator><description>&lt;p&gt;Mosquitto 1.6.6 and 1.5.9 have been released to address two security vulnerabilities.&lt;/p&gt;
&lt;p&gt;Titles and links will be updated once the CVE numbers are assigned.&lt;/p&gt;
&lt;h2 id="cve-2019-11779"&gt;CVE-2019-11779&lt;/h2&gt;
&lt;p&gt;A vulnerability exists in Mosquitto versions 1.5 to 1.6.5 inclusive, known as
&lt;a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11779"&gt;CVE-2019-11779&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;If a client sends a SUBSCRIBE packet containing a topic that consists of
approximately 65400 or more '/' characters, i.e. the topic hierarchy separator,
then a stack overflow will occur.&lt;/p&gt;
&lt;p&gt;The issue is fixed in Mosquitto 1.6.6 and 1.5.9. Patches for older versions are
available at &lt;a href="https://mosquitto.org/files/cve/2019-11779"&gt;https://mosquitto.org/files/cve/2019-11779&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The fix addresses the problem by restricting the allowed number of topic
hierarchy levels to 200. An alternative fix is to increase the size of the
stack by a small amount.&lt;/p&gt;
&lt;h2 id="cve-2019-11778"&gt;CVE-2019-11778&lt;/h2&gt;
&lt;p&gt;A vulnerability exists in Mosquitto version 1.6 to 1.6.4 inclusive, known as
&lt;a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11778"&gt;CVE-2019-11778&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;If an MQTT v5 client connects to Mosquitto, sets a last will and testament,
sets a will delay interval, sets a session expiry interval, and the will delay
interval is set longer than the session expiry interval, then a use after free
error occurs, which has the potential to cause a crash in some situations.&lt;/p&gt;
&lt;p&gt;The issue is fixed in Mosquitto 1.6.5. Patches for older versions are available
at &lt;a href="https://mosquitto.org/files/cve/2019-11778"&gt;https://mosquitto.org/files/cve/2019-11778&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="version-166-changes"&gt;Version 1.6.6 Changes&lt;/h2&gt;
&lt;p&gt;The complete list of fixes addressed in version 1.6.6 is:&lt;/p&gt;
&lt;h3 id="security"&gt;Security&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Restrict topic hierarchy to 200 levels to prevent possible stack overflow.
  Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/1412"&gt;#1412&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="broker"&gt;Broker&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Restrict topic hierarchy to 200 levels to prevent possible stack overflow.
  Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/1412"&gt;#1412&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;mosquitto_passwd&lt;/code&gt; now returns 1 when attempting to update a user that does
  not exist. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/1414"&gt;#1414&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><category>Releases</category><category>Security</category><guid>https://mosquitto.org/blog/2019/09/version-1-6-6-released/</guid><pubDate>Thu, 27 Sep 2018 09:36:19 GMT</pubDate></item><item><title>Security advisory: CVE-2017-7651, CVE-2017-7652</title><link>https://mosquitto.org/blog/2018/02/security-advisory-cve-2017-7651-cve-2017-7652/</link><dc:creator>Mosquitto Project</dc:creator><description>&lt;p&gt;Mosquitto 1.4.15 has been released to address two security vulnerabilities.&lt;/p&gt;
&lt;h2 id="cve-2017-7651"&gt;CVE-2017-7651&lt;/h2&gt;
&lt;p&gt;A vulnerability exists in all Mosquitto versions up to and including 1.4.14
known as &lt;a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7651"&gt;CVE-2017-7651&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Unauthenticated clients can send a crafted CONNECT packet which causes large
amounts of memory use in the broker. If multiple clients do this, an out of
memory situation can occur and the system may become unresponsive or the broker
will be killed by the operating system.&lt;/p&gt;
&lt;p&gt;The issue is fixed in Mosquitto 1.4.15. Patches for older versions are
available at &lt;a href="https://mosquitto.org/files/cve/2017-7651"&gt;https://mosquitto.org/files/cve/2017-7651&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The fix addresses the problem by limiting the permissible size for CONNECT
packet, and by adding a &lt;code&gt;memory_limit&lt;/code&gt; configuration option that allows the
broker to self limit the amount of memory it uses.&lt;/p&gt;
&lt;p&gt;Thanks to Felipe Balabanian for finding this vulnerability and responsibly
reporting it.&lt;/p&gt;
&lt;h2 id="cve-2017-7652"&gt;CVE-2017-7652&lt;/h2&gt;
&lt;p&gt;A vulnerability exists in Mosquitto versions 1.0 to 1.4.14 inclusive
known as &lt;a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7652"&gt;CVE-2017-7652&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;If the broker has exhausted all of its free sockets/file descriptors and then a
SIGHUP signal is received to trigger reloading of the configuration, then the
reloading will fail. This results in many of the configuration options,
including security options, being set to their default value. This means that
authorisation and access control may no longer be in place.&lt;/p&gt;
&lt;p&gt;The issue is fixed in Mosquitto 1.4.15. Patches for older versions are
available at &lt;a href="https://mosquitto.org/files/cve/2017-7652"&gt;https://mosquitto.org/files/cve/2017-7652&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The fix addresses the problem by only copying the new configuration options to
the in use configuration after a successful reload has taken place.&lt;/p&gt;
&lt;h2 id="version-1415-changes"&gt;Version 1.4.15 Changes&lt;/h2&gt;
&lt;p&gt;The complete list of fixes addressed in version 1.4.15 is:&lt;/p&gt;
&lt;h3 id="security"&gt;Security&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Fix &lt;a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7652"&gt;CVE-2017-7652&lt;/a&gt;. If a SIGHUP is sent to the broker when there are no more
  file descriptors, then opening the configuration file will fail and security
  settings will be set back to their default values.&lt;/li&gt;
&lt;li&gt;Fix &lt;a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7651"&gt;CVE-2017-7651&lt;/a&gt;. Unauthenticated clients can cause excessive memory use by
  setting "remaining length" to be a large value. This is now mitigated by
  limiting the size of remaining length to valid values. A &lt;code&gt;memory_limit&lt;/code&gt;
  configuration option has also been added to allow the overall memory used by
  the broker to be limited.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="broker"&gt;Broker&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Use constant time memcmp for password comparisons.&lt;/li&gt;
&lt;li&gt;Fix incorrect PSK key being used if it had leading zeroes.&lt;/li&gt;
&lt;li&gt;Fix memory leak if a client provided a username/password for a listener with
  &lt;code&gt;use_identity_as_username&lt;/code&gt; configured.&lt;/li&gt;
&lt;li&gt;Fix &lt;code&gt;use_identity_as_username&lt;/code&gt; not working on websockets clients.&lt;/li&gt;
&lt;li&gt;Don't crash if an auth plugin returns &lt;code&gt;MOSQ_ERR_AUTH&lt;/code&gt; for a username check on
  a websockets client. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/490"&gt;#490&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fix 08-ssl-bridge.py test when using async dns lookups. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/507"&gt;#507&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Lines in the config file are no longer limited to 1024 characters long.
  Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/652"&gt;#652&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fix $SYS counters of messages and bytes sent when message is sent over
  a Websockets. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/250"&gt;#250&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fix &lt;code&gt;upgrade_outgoing_qos&lt;/code&gt; for retained message. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/534"&gt;#534&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fix CONNACK message not being sent for unauthorised connect on websockets.
  Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/8"&gt;#8&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="client-library"&gt;Client library&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Fix incorrect PSK key being used if it had leading zeroes.&lt;/li&gt;
&lt;li&gt;Initialise "result" variable as soon as possible in
  &lt;code&gt;mosquitto_topic_matches_sub&lt;/code&gt;. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/654"&gt;#654&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;No need to close socket again if setting non-blocking failed. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/649"&gt;#649&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fix &lt;code&gt;mosquitto_topic_matches_sub()&lt;/code&gt; not correctly matching &lt;code&gt;foo/bar&lt;/code&gt; against
  &lt;code&gt;foo/+/#&lt;/code&gt;. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/670"&gt;#670&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="clients"&gt;Clients&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Correctly handle empty files with &lt;code&gt;mosquitto_pub -l&lt;/code&gt;. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/676"&gt;#676&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="build"&gt;Build&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Don't run TLS-PSK tests if TLS-PSK disabled at compile time. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/636"&gt;#636&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><category>Releases</category><category>Security</category><guid>https://mosquitto.org/blog/2018/02/security-advisory-cve-2017-7651-cve-2017-7652/</guid><pubDate>Tue, 27 Feb 2018 16:37:29 GMT</pubDate></item><item><title>Security advisory: CVE-2017-9868</title><link>https://mosquitto.org/blog/2017/06/security-advisory-cve-2017-9868/</link><dc:creator>Mosquitto Project</dc:creator><description>&lt;p&gt;A vulnerability exists in Mosquitto versions 0.15 to 1.4.12 inclusive known as
&lt;a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9868"&gt;CVE-2017-9868&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;If persistence is enabled, then the persistence file is created world readable,
which has the potential to make sensitive information available to any local
user.&lt;/p&gt;
&lt;p&gt;Patches are available to fix this for Unix like operating systems (i.e. not
Windows): &lt;a href="https://mosquitto.org/files/cve/2017-9868/"&gt;https://mosquitto.org/files/cve/2017-9868/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This will be fixed in version 1.4.13, due to be released shortly.&lt;/p&gt;
&lt;p&gt;This can also be fixed administratively by removing world read permissions for
the directory that the persistence file is stored in. In many systems this can
be achieved with:&lt;/p&gt;
&lt;div class="code"&gt;&lt;pre class="code literal-block"&gt;&lt;span class="n"&gt;chmod&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mi"&gt;700&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;/&lt;/span&gt;&lt;span class="k"&gt;var&lt;/span&gt;&lt;span class="o"&gt;/&lt;/span&gt;&lt;span class="n"&gt;lib&lt;/span&gt;&lt;span class="o"&gt;/&lt;/span&gt;&lt;span class="n"&gt;mosquitto&lt;/span&gt;
&lt;/pre&gt;&lt;/div&gt;</description><category>Security</category><guid>https://mosquitto.org/blog/2017/06/security-advisory-cve-2017-9868/</guid><pubDate>Mon, 26 Jun 2017 10:45:51 GMT</pubDate></item><item><title>Security advisory: CVE-2017-7650</title><link>https://mosquitto.org/blog/2017/05/security-advisory-cve-2017-7650/</link><dc:creator>Mosquitto Project</dc:creator><description>&lt;p&gt;A vulnerability exists in Mosquitto versions 0.15 to 1.4.11 inclusive known as
&lt;a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7650"&gt;CVE-2017-7650&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Pattern based ACLs can be bypassed by clients that set their username/client id
to '#' or '+'. This allows locally or remotely connected clients to access MQTT
topics that they do have the rights to. The same issue may be present in third
party authentication/access control plugins for Mosquitto.&lt;/p&gt;
&lt;p&gt;The vulnerability only comes into effect where pattern based ACLs are in use,
or potentially where third party plugins are in use.&lt;/p&gt;
&lt;p&gt;The issue is fixed in Mosquitto 1.4.12, which has just been released. Patches
for older versions are available at &lt;a href="https://mosquitto.org/files/cve/2017-7650"&gt;https://mosquitto.org/files/cve/2017-7650&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The fix addresses the problem by restricting access for clients with a '#',
'+', or '/' in their username or client id. '/' has been included in the list
of characters disallowed because it also has a special meaning in a topic and
may represent an additional risk. The restriction placed on clients is that
they may not receive or send messages that are subject to a pattern based ACL
check, nor any message that is subject to a plugin check.&lt;/p&gt;
&lt;p&gt;Thanks to Artem Zinenko from HackerDom CTF team for finding this vulnerability
and responsibly reporting it.&lt;/p&gt;
&lt;p&gt;Complete list of fixes addressed in version 1.4.12:&lt;/p&gt;
&lt;h2 id="broker"&gt;Broker&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Fix mosquitto.db from becoming corrupted due to client messages being
   persisted with no stored message. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/424"&gt;#424&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fix bridge not restarting properly. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/428"&gt;#428&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fix uninitialised memory in &lt;code&gt;gets_quiet&lt;/code&gt; on Windows. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/426"&gt;#426&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fix building with &lt;code&gt;WITH_ADNS=no&lt;/code&gt; for systems that don't use glibc. Closes
   &lt;a href="https://github.com/eclipse/mosquitto/issues/415"&gt;#415&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fixes to readme.md.&lt;/li&gt;
&lt;li&gt;Fix deprecation warning for OpenSSL 1.1. PR &lt;a href="https://github.com/eclipse/mosquitto/issues/416"&gt;#416&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Don't segfault on duplicate bridge names. Closes &lt;a href="https://github.com/eclipse/mosquitto/issues/446"&gt;#446&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fix &lt;a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7650"&gt;CVE-2017-7650&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><category>Releases</category><category>Security</category><guid>https://mosquitto.org/blog/2017/05/security-advisory-cve-2017-7650/</guid><pubDate>Mon, 29 May 2017 11:41:48 GMT</pubDate></item><item><title>Mosquitto and POODLE</title><link>https://mosquitto.org/blog/2014/10/mosquitto-and-poodle/</link><dc:creator>Mosquitto Project</dc:creator><description>&lt;p&gt;Details of the POODLE attack that targets SSLv3 have been released recently.
Mosquitto has never provided support for SSLv3 (or SSLv2) so should not be
vulnerable to this attack and does not require any configuration
changes.&lt;/p&gt;</description><category>Security</category><guid>https://mosquitto.org/blog/2014/10/mosquitto-and-poodle/</guid><pubDate>Thu, 16 Oct 2014 14:53:33 GMT</pubDate></item><item><title>Version 1.3.2 released</title><link>https://mosquitto.org/blog/2014/07/version-1-3-2-released/</link><dc:creator>Mosquitto Project</dc:creator><description>&lt;p&gt;This is a security and bugfix release.&lt;/p&gt;
&lt;h2 id="security"&gt;Security&lt;/h2&gt;
&lt;p&gt;A bug in the way that mosquitto handles authentication plugins has been
identified. When using a plugin for authentication purposes, if the plugin
returns &lt;code&gt;MOSQ_ERR_UNKNOWN&lt;/code&gt; when making an authentication check, as might happen
if a database was unavailable for example, then mosquitto incorrectly treats
this as a successful authentication. This has the potential for unauthorised
clients to access the running mosquitto broker and gain access to information
to which they are not authorised. This is an important update for users of
authentication plugins in mosquitto.&lt;/p&gt;
&lt;h2 id="broker"&gt;Broker&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Don't allow access to clients when authenticating if a security plugin
   returns an application error. Fixes bug &lt;a href="https://bugs.launchpad.net/mosquitto/+bug/1340782"&gt;#1340782&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Ensure that bridges verify certificates by default when using TLS.&lt;/li&gt;
&lt;li&gt;Fix possible crash when using pattern ACLs that do not include a %u and
   clients that connect without a username.&lt;/li&gt;
&lt;li&gt;Fix subscriptions being deleted when clients subscribed to a topic beginning
   with a $ but that is not $SYS.&lt;/li&gt;
&lt;li&gt;When a durable client reconnects, its queued messages are now checked
   against ACLs in case of a change in username/ACL state since it last
   connected.&lt;/li&gt;
&lt;li&gt;Anonymous clients are no longer accidentally disconnected from the broker
   after a SIGHUP.&lt;/li&gt;
&lt;li&gt;Fix bug &lt;a href="https://bugs.launchpad.net/mosquitto/+bug/1324411"&gt;#1324411&lt;/a&gt;, which could have had unexpected consequences for delayed
   messages in rare circumstances.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="client-library"&gt;Client library&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Fix topic matching edge case.&lt;/li&gt;
&lt;li&gt;Fix callback deadlocks after calling &lt;code&gt;mosquitto_disconnect()&lt;/code&gt;, when using
   the threaded interfaces. Closes bug &lt;a href="https://bugs.launchpad.net/mosquitto/+bug/1313725"&gt;#1313725&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fix SRV support when building with CMake.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="general"&gt;General&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Use $(STRIP) for stripping binaries when installing, to allow easier cross
   compilation.&lt;/li&gt;
&lt;/ul&gt;</description><category>Releases</category><category>Security</category><guid>https://mosquitto.org/blog/2014/07/version-1-3-2-released/</guid><pubDate>Mon, 14 Jul 2014 12:10:05 GMT</pubDate></item></channel></rss>