Fedora Linux 8579 Published by

A mosquitto security update has been released for Fedora 38.



[SECURITY] Fedora 38 Update: mosquitto-2.0.17-1.fc38


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-6a87c003c4
2023-09-01 01:28:16.436319
--------------------------------------------------------------------------------

Name : mosquitto
Product : Fedora 38
Version : 2.0.17
Release : 1.fc38
URL : https://mosquitto.org/
Summary : Open Source MQTT v5/v3.1.x Broker
Description :
Mosquitto is an open source message broker that implements the MQ Telemetry
Transport protocol version 3.1 and 3.1.1 MQTT provides a lightweight method
of carrying out messaging using a publish/subscribe model. This makes it
suitable for "machine to machine" messaging such as with low power sensors
or mobile devices such as phones, embedded computers or micro-controllers
like the Arduino.

--------------------------------------------------------------------------------
Update Information:

2.0.17 Broker: * Fix `max_queued_messages 0` stopping clients from receiving
messages * Fix `max_inflight_messages` not being set correctly. Apps: * Fix
`mosquitto_passwd -U` backup file creation. 2.0.16 Security: *
CVE-2023-28366: Fix memory leak in broker when clients send multiple QoS 2
messages with the same message ID, but then never respond to the PUBREC
commands. * CVE-2023-0809: Fix excessive memory being allocated based on
malicious initial packets that are not CONNECT packets. * CVE-2023-3592: Fix
memory leak when clients send v5 CONNECT packets with a will message that
contains invalid property types. * Broker will now reject Will messages that
attempt to publish to $CONTROL/. * Broker now validates usernames provided in a
TLS certificate or TLS-PSK identity are valid UTF-8. * Fix potential crash when
loading invalid persistence file. * Library will no longer allow single level
wildcard certificates, e.g. *.com Broker: * Fix $SYS messages being expired
after 60 seconds and hence unchanged values disappearing. * Fix some retained
topic memory not being cleared immediately after used. * Fix error handling
related to the `bind_interface` option. * Fix std* files not being redirected
when daemonising, when built with assertions removed. * Fix default settings
incorrectly allowing TLS v1.1. * Use line buffered mode for stdout. Closes
#2354. * Fix bridges with non-matching cleansession/local_cleansession being
expired on start after restoring from persistence. * Fix connections being
limited to 2048 on Windows. The limit is now 8192, where supported. * Broker
will log warnings if sensitive files are world readable/writable, or if the
owner/group is not the same as the user/group the broker is running as. In
future versions the broker will refuse to open these files. *
mosquitto_memcmp_const is now more constant time. * Only register with DLT if
DLT logging is enabled. * Fix any possible case where a json string might be
incorrectly loaded. This could have caused a crash if a textname or
textdescription field of a role was not a string, when loading the dynsec config
from file only. * Dynsec plugin will not allow duplicate clients/groups/roles
when loading config from file, which matches the behaviour for when creating
them. * Fix heap overflow when reading corrupt config with "log_dest file".
Client library: * Use CLOCK_BOOTTIME when available, to keep track of time.
This solves the problem of the client OS sleeping and the client hence not being
able to calculate the actual time for keepalive purposes. * Fix default settings
incorrectly allowing TLS v1.1. * Fix high CPU use on slow TLS connect. Clients:
* Fix incorrect topic-alias property value in mosquitto_sub json output. * Fix
confusing message on TLS certificate verification. Apps: * mosquitto_passwd
uses mkstemp() for backup files. * `mosquitto_ctrl dynsec init` will refuse to
overwrite an existing file, without a race-condition.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Aug 23 2023 Peter Robinson [pbrobinson@fedoraproject.org] - 2.0.17-1
- Update to 2.0.17
* Fri Aug 18 2023 Peter Robinson [pbrobinson@fedoraproject.org] - 2.0.16-1
- Update to 2.0.16
* Thu Jul 20 2023 Fedora Release Engineering [releng@fedoraproject.org] - 2.0.15-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2171596 - libwebsockets: FTBFS in Fedora rawhide/f38
https://bugzilla.redhat.com/show_bug.cgi?id=2171596
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-6a87c003c4' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------