<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mosquitto</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2026:20260-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-02-23T18:17:43Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-02-23T18:17:43Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-02-23T18:17:43Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mosquitto</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for mosquitto fixes the following issues:

Changes in mosquitto:

- update to 2.0.23 (boo#1258671)
  * Fix handling of disconnected sessions for `per_listener_settings
    true`
  * Check return values of openssl *_get_ex_data() and
    *_set_ex_data() to prevent possible crash. This could occur only
    in extremely unlikely situations
  * Check return value of openssl ASN1_string_[get0_]data()
    functions for NULL. This prevents a crash in case of incorrect
    certificate handling in openssl
  * Fix potential crash on startup if a malicious/corrupt
    persistence file from mosquitto 1.5 or earlier is loaded
  * Limit auto_id_prefix to 50 characters

- Update to version 2.0.22
  Broker
  * Bridge: Fix idle_timeout never occurring for lazy bridges.
  * Fix case where max_queued_messages = 0 was not treated as
    unlimited.
  * Fix --version exit code and output.
  * Fix crash on receiving a $CONTROL message over a bridge, if
    per_listener_settings is set true and the bridge is carrying
    out topic remapping.
  * Fix incorrect reference clock being selected on startup on
    Linux. Closes #3238.
  * Fix reporting of client disconnections being incorrectly
    attributed to "out of memory".
  * Fix compilation when using WITH_OLD_KEEPALIVE.
  * Fix problems with secure websockets.
  * Fix crash on exit when using WITH_EPOLL=no.
  * Fix clients being incorrectly expired when they have
    keepalive == max_keepalive. Closes #3226, #3286.
  Dynamic security plugin
  * Fix mismatch memory free when saving config which caused
    memory tracking to be incorrect.
  Client library
  * Fix C++ symbols being removed when compiled with link time
    optimisation.
  * TLS error handling was incorrectly setting a protocol error
    for non-TLS errors. This would cause the mosquitto_loop_start()
    thread to exit if no broker was available on the first
    connection attempt. This has been fixed. Closes #3258.
  * Fix linker errors on some architectures using cmake.

- Update to version 2.0.21
  Broker
  * Fix clients sending a RESERVED packet not being quickly
    disconnected.
  * Fix bind_interface producing an error when used with an
    interface that has an IPv6 link-local address and no other
    IPv6 addresses.
  * Fix mismatched wrapped/unwrapped memory alloc/free in
    properties.
  * Fix allow_anonymous false not being applied in local only mode.
  * Add retain_expiry_interval option to fix expired retained
    message not being removed from memory if they are not
    subscribed to.
  * Produce an error if invalid combinations of
    cafile/capath/certfile/keyfile are used.
  * Backport keepalive checking from develop to fix problems in
    current implementation.
  Client library
  * Fix potential deadlock in mosquitto_sub if -W is used.
  Apps
  * mosquitto_ctrl dynsec now also allows -i to specify a clientid
    as well as -c. This matches the documentation which states -i.
  Tests
  * Fix 08-ssl-connect-cert-auth-expired and
    08-ssl-connect-cert-auth-revoked tests when under load.

- systemd service: Wait till the network got setup to avoid
  startup failure.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Leap-16.0-packagehub-138</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232635</URL>
      <Description>SUSE Bug 1232635</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232636</URL>
      <Description>SUSE Bug 1232636</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1258671</URL>
      <Description>SUSE Bug 1258671</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-10525/</URL>
      <Description>SUSE CVE CVE-2024-10525 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-3935/</URL>
      <Description>SUSE CVE CVE-2024-3935 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 16.0">
      <Branch Type="Product Name" Name="openSUSE Leap 16.0">
        <FullProductName ProductID="openSUSE Leap 16.0">openSUSE Leap 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmosquitto1-2.0.23-bp160.1.1">
      <FullProductName ProductID="libmosquitto1-2.0.23-bp160.1.1">libmosquitto1-2.0.23-bp160.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmosquittopp1-2.0.23-bp160.1.1">
      <FullProductName ProductID="libmosquittopp1-2.0.23-bp160.1.1">libmosquittopp1-2.0.23-bp160.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mosquitto-2.0.23-bp160.1.1">
      <FullProductName ProductID="mosquitto-2.0.23-bp160.1.1">mosquitto-2.0.23-bp160.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mosquitto-clients-2.0.23-bp160.1.1">
      <FullProductName ProductID="mosquitto-clients-2.0.23-bp160.1.1">mosquitto-clients-2.0.23-bp160.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mosquitto-devel-2.0.23-bp160.1.1">
      <FullProductName ProductID="mosquitto-devel-2.0.23-bp160.1.1">mosquitto-devel-2.0.23-bp160.1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmosquitto1-2.0.23-bp160.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:libmosquitto1-2.0.23-bp160.1.1">libmosquitto1-2.0.23-bp160.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmosquittopp1-2.0.23-bp160.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:libmosquittopp1-2.0.23-bp160.1.1">libmosquittopp1-2.0.23-bp160.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="mosquitto-2.0.23-bp160.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:mosquitto-2.0.23-bp160.1.1">mosquitto-2.0.23-bp160.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="mosquitto-clients-2.0.23-bp160.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:mosquitto-clients-2.0.23-bp160.1.1">mosquitto-clients-2.0.23-bp160.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="mosquitto-devel-2.0.23-bp160.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:mosquitto-devel-2.0.23-bp160.1.1">mosquitto-devel-2.0.23-bp160.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients.</Note>
    </Notes>
    <CVE>CVE-2024-10525</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:libmosquitto1-2.0.23-bp160.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libmosquittopp1-2.0.23-bp160.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:mosquitto-2.0.23-bp160.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:mosquitto-clients-2.0.23-bp160.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:mosquitto-devel-2.0.23-bp160.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-10525.html</URL>
        <Description>CVE-2024-10525</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232636</URL>
        <Description>SUSE Bug 1232636</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Eclipse Mosquito, versions from 2.0.0 through 2.0.18, if a Mosquitto broker is configured to create an outgoing bridge connection, and that bridge connection has an incoming topic configured that makes use of topic remapping, then if the remote connection sends a crafted PUBLISH packet to the broker a double free will occur with a subsequent crash of the broker.</Note>
    </Notes>
    <CVE>CVE-2024-3935</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:libmosquitto1-2.0.23-bp160.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libmosquittopp1-2.0.23-bp160.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:mosquitto-2.0.23-bp160.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:mosquitto-clients-2.0.23-bp160.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:mosquitto-devel-2.0.23-bp160.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-3935.html</URL>
        <Description>CVE-2024-3935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232635</URL>
        <Description>SUSE Bug 1232635</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
