Change logs for mosquitto source package in Bionic

  • mosquitto (1.4.15-2ubuntu0.18.04.3) bionic-security; urgency=medium
    
      * SECURITY UPDATE: DoS (client disconnect) via invalid UTF-8 strings
        - debian/patches/add-validate-utf8.patch: Add validate UTF-8
        - debian/patches/CVE-2017-7653.patch: Add UTF-8 tests, plus some validation
          fixes
        - CVE-2017-7653
      * SECURITY UPDATE: Memory leak in the Mosquitto Broker allows unauthenticated
        clients to send crafted CONNECT packets which could cause DoS
        - debian/patches/CVE-2017-7654.patch: Fix memory leak that could be caused
          by a malicious CONNECT packet
        - CVE-2017-7654
    
     -- Eduardo Barretto <email address hidden>  Tue, 18 Jun 2019 11:42:22 -0300
  • mosquitto (1.4.15-2ubuntu0.18.04.2) bionic-security; urgency=medium
    
      * Fix regression in update for CVE-2018-12546.
    
     -- <email address hidden> (Roger A. Light)  Wed, 13 Feb 2019 00:27:01 +0000
  • mosquitto (1.4.15-2ubuntu0.18.04.1) bionic-security; urgency=medium
    
      * SECURITY UPDATE: If Mosquitto is configured to use a password file for
        authentication, any malformed data in the password file will be treated as
        valid. This typically means that the malformed data becomes a username and
        no password. If this occurs, clients can circumvent authentication and get
        access to the broker by using the malformed username. In particular, a blank
        line will be treated as a valid empty username. Other security measures are
        unaffected. Users who have only used the mosquitto_passwd utility to create
        and modify their password files are unaffected by this vulnerability.
        - debian/patches/mosquitto-1.4.x-cve-2018-12551.patch: this fix introduces
          more stringent parsing tests on the password file data.
        - CVE-2018-12551
      * SECURITY UPDATE: If an ACL file is empty, or has only blank lines or
        comments, then mosquitto treats the ACL file as not being defined, which
        means that no topic access is denied. Although denying access to all
        topics is not a useful configuration, this behaviour is unexpected and
        could lead to access being incorrectly granted in some circumstances.
        - debian/patches/mosquitto-1.4.x-cve-2018-12550.patch: this fix ensures
          that if an ACL file is defined but no rules are defined, then access will
          be denied.
        - CVE-2018-12550
      * SECURITY UPDATE: If a client publishes a retained message to a topic that
        they have access to, and then their access to that topic is revoked, the
        retained message will still be delivered to future subscribers. This
        behaviour may be undesirable in some applications, so a configuration
        option `check_retain_source` has been introduced to enforce checking of
        the retained message source on publish.
        - debian/patches/mosquitto-1.4.15-cve-2018-12546.patch: this patch stores
          the originator of the retained message, so security checking can be
          carried out before re-publishing. The complexity of the patch is due to
          the need to save this information across broker restarts.
        - CVE-2018-12546
    
     -- <email address hidden> (Roger A. Light)  Wed, 06 Feb 2019 17:03:31 +0000
  • mosquitto (1.4.15-2) unstable; urgency=low
    
      * Replace mentions of 'c_rehash' with 'openssl rehash'. (Closes: #895084).
    
     -- Roger A. Light <email address hidden>  Sat, 07 Apr 2018 11:16:43 +0100
  • mosquitto (1.4.15-1) unstable; urgency=high
    
      * SECURITY UPDATE: If a SIGHUP is sent to the broker when there are no more
        file descriptors, then opening the configuration file will fail and
        security settings will be set back to their default values.
        - debian/patches/mosquitto-1.4.10_cve-2017-7652.patch: When reloading
          configuration, do this into a separate config struct. If nothing fails,
          then copy the new config over the old config.
        - CVE-2017-7652
      * SECURITY UPDATE: Unauthenticated clients can cause excessive memory usage.
        This has the potential to lead to an OOM situation and the broker being
        killed by the system.
        - debian/patches/mosquitto-1.4.10_cve-2017-7652.patch: Limit the maximum
          size of CONNECT packet to a reasonable value, and add "memory_limit"
          option to set the maximum memory the broker will use.
        - CVE-2017-7651
      * New upstream release.
      * Remove upstart support, which had accidently been reinstated in 1.4.14-2.
      * Bumped standards version to 4.1.3, no changes required.
      * Fix global-files-wildcard-not-first-paragraph-in-dep5-copyright.
    
     -- Roger A. Light <email address hidden>  Wed, 28 Feb 2018 11:29:47 +0000
  • mosquitto (1.4.14-2build1) bionic; urgency=high
    
      * No change rebuild against openssl1.1.
    
     -- Dimitri John Ledkov <email address hidden>  Mon, 05 Feb 2018 23:23:03 +0000
  • mosquitto (1.4.14-2) unstable; urgency=low
    
      * Fix lintian error "build-depends-on-obsolete-package"
      * Fix lintian warning "extended-description-line-too-long"
      * The 1.4.14 release relaxes the restrictions on client ids, which means
        that the mosquitto_pub/sub autogenerated ids are no longer a problem.
        (closes #870165).
    
     -- Roger A. Light <email address hidden>  Tue, 26 Dec 2017 22:03:57 +0000
  • mosquitto (1.4.14-1) unstable; urgency=medium
    
      * SECURITY UPDATE: Persistence file is world readable, which may expose
        sensitive data. Fixed by upstream release 1.4.13.
        - CVE-2017-9868
      * New upstream release.
      * Remove upstart support.
      * Bumped standards version to 4.1.2.
        - Removed invoke-rc.d conditionals.
        - Changed "extra" priorities to "optional".
      * Build-Depends: Add dh-systemd, bump libwebsockets to >=2.0.
      * no-man-clean.patch - don't clean man pages from source directory.
      * async_dns.patch - enable bridge async DNS lookups.
    
     -- Roger A. Light <email address hidden>  Fri, 22 Dec 2017 07:14:19 +0000
  • mosquitto (1.4.12-1) experimental; urgency=low
    
      * New upstream release.
    
     -- Roger A. Light <email address hidden>  Mon, 29 May 2017 14:56:32 +0100