Accepted mosquitto 1.4.10-3+deb9u3 (source) into proposed-updates->stable-new, proposed-updates
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 06 Feb 2019 17:03:31 +0000
Source: mosquitto
Binary: mosquitto mosquitto-dev libmosquitto1 libmosquitto-dev libmosquittopp1 libmosquittopp-dev mosquitto-clients mosquitto-dbg libmosquitto1-dbg libmosquittopp1-dbg
Architecture: source
Version: 1.4.10-3+deb9u3
Distribution: stretch-security
Urgency: high
Maintainer: Roger A. Light <roger@atchoo.org>
Changed-By: Roger A. Light <roger@atchoo.org>
Description:
libmosquitto-dev - MQTT version 3.1/3.1.1 client library, development files
libmosquitto1 - MQTT version 3.1/3.1.1 client library
libmosquitto1-dbg - debugging symbols for libmosquitto binaries
libmosquittopp-dev - MQTT version 3.1 client C++ library, development files
libmosquittopp1 - MQTT version 3.1/3.1.1 client C++ library
libmosquittopp1-dbg - debugging symbols for libmosquittopp binaries
mosquitto - MQTT version 3.1/3.1.1 compatible message broker
mosquitto-clients - Mosquitto command line MQTT clients
mosquitto-dbg - debugging symbols for mosquitto binaries
mosquitto-dev - Development files for Mosquitto
Changes:
mosquitto (1.4.10-3+deb9u3) stretch-security; urgency=high
.
* SECURITY UPDATE: If Mosquitto is configured to use a password file for
authentication, any malformed data in the password file will be treated as
valid. This typically means that the malformed data becomes a username and
no password. If this occurs, clients can circumvent authentication and get
access to the broker by using the malformed username. In particular, a blank
line will be treated as a valid empty username. Other security measures are
unaffected. Users who have only used the mosquitto_passwd utility to create
and modify their password files are unaffected by this vulnerability.
- debian/patches/mosquitto-1.4.x-cve-2018-12551.patch: this fix introduces
more stringent parsing tests on the password file data.
- CVE-2018-12551
* SECURITY UPDATE: If an ACL file is empty, or has only blank lines or
comments, then mosquitto treats the ACL file as not being defined, which
means that no topic access is denied. Although denying access to all
topics is not a useful configuration, this behaviour is unexpected and
could lead to access being incorrectly granted in some circumstances.
- debian/patches/mosquitto-1.4.x-cve-2018-12550.patch: this fix ensures
that if an ACL file is defined but no rules are defined, then access will
be denied.
- CVE-2018-12550
* SECURITY UPDATE: If a client publishes a retained message to a topic that
they have access to, and then their access to that topic is revoked, the
retained message will still be delivered to future subscribers. This
behaviour may be undesirable in some applications, so a configuration
option `check_retain_source` has been introduced to enforce checking of
the retained message source on publish.
- debian/patches/mosquitto-1.4.9-1.4.14-cve-2018-12546.patch: this patch stores
the originator of the retained message, so security checking can be
carried out before re-publishing. The complexity of the patch is due to
the need to save this information across broker restarts.
- CVE-2018-12546
Checksums-Sha1:
b135c36b2f205dfc13983debbee0a8eadbfeb38f 2698 mosquitto_1.4.10-3+deb9u3.dsc
73a54aa69f6f21bb879fc2a7be7eb326dfd5fb1c 37312 mosquitto_1.4.10-3+deb9u3.debian.tar.xz
Checksums-Sha256:
0151a72c2b2df01b73b2eef3666768508189584d04ff00773f8fb5f52b9df743 2698 mosquitto_1.4.10-3+deb9u3.dsc
d5fecc9ed78a2eb208156dfdf67d889bc9317adf0c46059598da2bc43a2ebd95 37312 mosquitto_1.4.10-3+deb9u3.debian.tar.xz
Files:
f921224fca6839ded6eb5ad2954e0bc8 2698 net optional mosquitto_1.4.10-3+deb9u3.dsc
398606ce67a94057b2ba587dadd8f11d 37312 net optional mosquitto_1.4.10-3+deb9u3.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlxdgMZfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
ZWJpYW4ub3JnAAoJEAVMuPMTQ89EpXUP/ieywU4Afio4+FdRG+rgx73b9ahZCZPN
OvN2c2twYjqZnt/o5n85aZEnnhaohS1cpl7kiBVKOIBKtqDnF3vNejtoxOyZwwWQ
gv7zQyldEdTd5LlJQQ9Anw6vJVUqYNXqewbULS12+HTyX3+JyqTcI9XCT/g1wX9c
8cp3T77Tz0U6C8KAhhPxNTUSpT/QEwawe+DAIjwPcB6eLuxf3zlipkuFJpuMkBPY
sWd3A7jqKpkFXM0D0c1oE+0cyMVzwXYheosiRH0pqZamVUA080qDQPcAAukjMuks
G3G/HNeFgZbYQb3gksO/shZnU2OAo6i3+HHDdXZKvjBQk8qpgTDJwIpRE7o5phes
fb2YM1R7pZk23sgRcs0hW0Xx/zO7pb/ly7Y3kc1XXGd/bz5PJQdeCY1mqe5W9+on
k2bjp0ZFGmIox7YliSefC2yQOgXShvANLXp6FbN3EqChUNhwUFOeBX/zzF0vLQ4q
pTcbhcpbe1Xihfy0XB4D14Mx4DZHVNB2SEQBaCmplaC067lnDtDLsl5zpCoA6w8F
OBYcPl/fTYXGYnuopMrX1tHqoTwKvrzTx0Jx/gHv+I0EqNmQrVNCDlmNl/TYgGCb
wUDGY7ucCuglU9Ac1W5Xw52YFh05/0C696aypgK5IhK3HMVRNmvESINYiawzQVZi
veQcf4I3BDqb
=UlO+
-----END PGP SIGNATURE-----