An Open Source MQTT v3.1/v3.1.1 Broker

Edit Package mosquitto
http://mosquitto.org/

Mosquitto is an open source (BSD licensed) message broker that implements the
MQ Telemetry Transport protocol versions 3.1 and 3.1.1. MQTT provides a
lightweight method of carrying out messaging using a publish/subscribe model.
This makes it suitable for "machine to machine" messaging such as with low
power sensors or mobile devices such as phones, embedded computers or
microcontrollers like the Arduino. A good example of this is all of the work
that Andy Stanford-Clark (one of the originators of MQTT) has done in home
monitoring and automation with his twittering house and twittering ferry.

Refresh
Refresh
Source Files
Filename Size Changed
README-ca_certificates 0000000073 73 Bytes
README-certs 0000000130 130 Bytes
README-conf-d 0000000142 142 Bytes
mosquitto-1.4.1_apparmor.patch 0000000773 773 Bytes
mosquitto-1.6.8-config.patch 0000000471 471 Bytes
mosquitto-2.0.18.tar.gz 0000796351 778 KB
mosquitto-2.0.18.tar.gz.sig 0000000833 833 Bytes
mosquitto.changes 0000075687 73.9 KB
mosquitto.keyring 0000012218 11.9 KB
mosquitto.service 0000000634 634 Bytes
mosquitto.spec 0000007663 7.48 KB
Latest Revision
Yuchen Lin's avatar Yuchen Lin (maxlin_factory) accepted request 1135795 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 5)
- update to 2.0.18 (bsc#1214918, CVE-2023-28366, bsc#1215865,
                    CVE-2023-0809, bsc#1215864, CVE-2023-3592):
  * Fix crash on subscribe under certain unlikely conditions.
  * Fix mosquitto_rr not honouring `-R`. Closes #2893.
  * Fix `max_queued_messages 0` stopping clients from receiving
    messages.
  * Fix `max_inflight_messages` not being set correctly.
  * Fix `mosquitto_passwd -U` backup file creation.
  * CVE-2023-28366: Fix memory leak in broker when clients send
    multiple QoS 2 messages with the same message ID, but then
    never respond to the PUBREC commands.
  * CVE-2023-0809: Fix excessive memory being allocated based on
    malicious initial packets that are not CONNECT packets.
  * CVE-2023-3592: Fix memory leak when clients send v5 CONNECT
    packets with a will message that contains invalid property
    types.
  * Broker will now reject Will messages that attempt to publish
    to $CONTROL/.
  * Broker now validates usernames provided in a TLS certificate
    or TLS-PSK identity are valid UTF-8.
  * Fix potential crash when loading invalid persistence file.
  * Library will no longer allow single level wildcard
    certificates, e.g. *.com
  * Fix $SYS messages being expired after 60 seconds and hence
    unchanged values disappearing.
  * Fix some retained topic memory not being cleared immediately
    after used.
  * Fix error handling related to the `bind_interface` option.
  * Fix std* files not being redirected when daemonising, when
    built with assertions removed.
Comments 0
openSUSE Build Service is sponsored by