In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its onsubscribe callback. This affects the mosquittosub and mosquitto_rr clients.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-10525.json"
[
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://github.com/eclipse-mosquitto/mosquitto/commit/8ab20b4ba4204fdcdec78cb4d9f03c944a6e0e1c",
"digest": {
"function_hash": "29036111489348541762894021766668069100",
"length": 1918.0
},
"id": "CVE-2024-10525-d05b89c8",
"deprecated": false,
"target": {
"file": "lib/handle_suback.c",
"function": "handle__suback"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://github.com/eclipse-mosquitto/mosquitto/commit/8ab20b4ba4204fdcdec78cb4d9f03c944a6e0e1c",
"digest": {
"line_hashes": [
"94950051260452402365347931505757235218",
"96581849340855976114804582782750664304",
"5849565670273732554841845849192978354",
"173389902800579440755348116221827973798"
],
"threshold": 0.9
},
"id": "CVE-2024-10525-fcb71ac0",
"deprecated": false,
"target": {
"file": "lib/handle_suback.c"
}
}
]