{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"Critical"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"mosquitto security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for mosquitto is now available for openEuler-22.03-LTS-SP1",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"Mosquitto is an open source message broker that implements the MQ Telemetry Transport protocol version 3.1 and 3.1.1 MQTT provides a lightweight method of carrying out messaging using a publish/subscribe model. This makes it suitable for \"machine to machine\" messaging such as with low power sensors or mobile devices such as phones, embedded computers or micro-controllers like the Arduino.\n\nSecurity Fix(es):\n\nIn Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients.(CVE-2024-10525)\n\nIn Eclipse Mosquito, versions from 2.0.0 through 2.0.18, if a Mosquitto broker is configured to create an outgoing bridge connection, and that bridge connection has an incoming topic configured that makes use of topic remapping, then if the remote connection sends a crafted PUBLISH packet to the broker a double free will occur with a subsequent crash of the broker.(CVE-2024-3935)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for mosquitto is now available for openEuler-20.03-LTS-SP4/openEuler-22.03-LTS-SP1.\n\nopenEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"Critical",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"mosquitto",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-2344",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2344"
			},
			{
				"summary":"CVE-2024-10525",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-10525&packageName=mosquitto"
			},
			{
				"summary":"CVE-2024-3935",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-3935&packageName=mosquitto"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10525"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3935"
			},
			{
				"summary":"openEuler-SA-2024-2344 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-2344.json"
			}
		],
		"title":"An update for mosquitto is now available for openEuler-22.03-LTS-SP1",
		"tracking":{
			"initial_release_date":"2024-11-08T23:09:46+08:00",
			"revision_history":[
				{
					"date":"2024-11-08T23:09:46+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2024-11-08T23:09:46+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-11-08T23:09:46+08:00",
			"id":"openEuler-SA-2024-2344",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"openEuler-22.03-LTS-SP1",
									"name":"openEuler-22.03-LTS-SP1"
								},
								"name":"openEuler-22.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mosquitto-2.0.20-1.oe2203sp1.x86_64.rpm",
									"name":"mosquitto-2.0.20-1.oe2203sp1.x86_64.rpm"
								},
								"name":"mosquitto-2.0.20-1.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mosquitto-debuginfo-2.0.20-1.oe2203sp1.x86_64.rpm",
									"name":"mosquitto-debuginfo-2.0.20-1.oe2203sp1.x86_64.rpm"
								},
								"name":"mosquitto-debuginfo-2.0.20-1.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mosquitto-debugsource-2.0.20-1.oe2203sp1.x86_64.rpm",
									"name":"mosquitto-debugsource-2.0.20-1.oe2203sp1.x86_64.rpm"
								},
								"name":"mosquitto-debugsource-2.0.20-1.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mosquitto-devel-2.0.20-1.oe2203sp1.x86_64.rpm",
									"name":"mosquitto-devel-2.0.20-1.oe2203sp1.x86_64.rpm"
								},
								"name":"mosquitto-devel-2.0.20-1.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mosquitto-2.0.20-1.oe2203sp1.aarch64.rpm",
									"name":"mosquitto-2.0.20-1.oe2203sp1.aarch64.rpm"
								},
								"name":"mosquitto-2.0.20-1.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mosquitto-debuginfo-2.0.20-1.oe2203sp1.aarch64.rpm",
									"name":"mosquitto-debuginfo-2.0.20-1.oe2203sp1.aarch64.rpm"
								},
								"name":"mosquitto-debuginfo-2.0.20-1.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mosquitto-debugsource-2.0.20-1.oe2203sp1.aarch64.rpm",
									"name":"mosquitto-debugsource-2.0.20-1.oe2203sp1.aarch64.rpm"
								},
								"name":"mosquitto-debugsource-2.0.20-1.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mosquitto-devel-2.0.20-1.oe2203sp1.aarch64.rpm",
									"name":"mosquitto-devel-2.0.20-1.oe2203sp1.aarch64.rpm"
								},
								"name":"mosquitto-devel-2.0.20-1.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mosquitto-2.0.20-1.oe2203sp1.src.rpm",
									"name":"mosquitto-2.0.20-1.oe2203sp1.src.rpm"
								},
								"name":"mosquitto-2.0.20-1.oe2203sp1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mosquitto-2.0.20-1.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.x86_64",
					"name":"mosquitto-2.0.20-1.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mosquitto-debuginfo-2.0.20-1.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mosquitto-debuginfo-2.0.20-1.oe2203sp1.x86_64",
					"name":"mosquitto-debuginfo-2.0.20-1.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mosquitto-debugsource-2.0.20-1.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mosquitto-debugsource-2.0.20-1.oe2203sp1.x86_64",
					"name":"mosquitto-debugsource-2.0.20-1.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mosquitto-devel-2.0.20-1.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mosquitto-devel-2.0.20-1.oe2203sp1.x86_64",
					"name":"mosquitto-devel-2.0.20-1.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mosquitto-2.0.20-1.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.aarch64",
					"name":"mosquitto-2.0.20-1.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mosquitto-debuginfo-2.0.20-1.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mosquitto-debuginfo-2.0.20-1.oe2203sp1.aarch64",
					"name":"mosquitto-debuginfo-2.0.20-1.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mosquitto-debugsource-2.0.20-1.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mosquitto-debugsource-2.0.20-1.oe2203sp1.aarch64",
					"name":"mosquitto-debugsource-2.0.20-1.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mosquitto-devel-2.0.20-1.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mosquitto-devel-2.0.20-1.oe2203sp1.aarch64",
					"name":"mosquitto-devel-2.0.20-1.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mosquitto-2.0.20-1.oe2203sp1.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.src",
					"name":"mosquitto-2.0.20-1.oe2203sp1.src as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2024-10525",
			"notes":[
				{
					"text":"In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:mosquitto-debuginfo-2.0.20-1.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:mosquitto-debugsource-2.0.20-1.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:mosquitto-devel-2.0.20-1.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:mosquitto-debuginfo-2.0.20-1.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:mosquitto-debugsource-2.0.20-1.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:mosquitto-devel-2.0.20-1.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-debuginfo-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-debugsource-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-devel-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-debuginfo-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-debugsource-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-devel-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.src"
					],
					"details":"mosquitto security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2344"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"CRITICAL",
						"baseScore":9.1,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-debuginfo-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-debugsource-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-devel-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-debuginfo-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-debugsource-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-devel-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.src"
					]
				}
			],
			"threats":[
				{
					"details":"Critical",
					"category":"impact"
				}
			],
			"title":"CVE-2024-10525"
		},
		{
			"cve":"CVE-2024-3935",
			"notes":[
				{
					"text":"In Eclipse Mosquito, versions from 2.0.0 through 2.0.18, if a Mosquitto broker is configured to create an outgoing bridge connection, and that bridge connection has an incoming topic configured that makes use of topic remapping, then if the remote connection sends a crafted PUBLISH packet to the broker a double free will occur with a subsequent crash of the broker.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:mosquitto-debuginfo-2.0.20-1.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:mosquitto-debugsource-2.0.20-1.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:mosquitto-devel-2.0.20-1.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:mosquitto-debuginfo-2.0.20-1.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:mosquitto-debugsource-2.0.20-1.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:mosquitto-devel-2.0.20-1.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-debuginfo-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-debugsource-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-devel-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-debuginfo-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-debugsource-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-devel-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.src"
					],
					"details":"mosquitto security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2344"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-debuginfo-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-debugsource-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-devel-2.0.20-1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-debuginfo-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-debugsource-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-devel-2.0.20-1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mosquitto-2.0.20-1.oe2203sp1.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-3935"
		}
	]
}