An Open Source MQTT v3.1/v3.1.1 Broker
http://mosquitto.org/
Mosquitto is an open source (BSD licensed) message broker that implements the
MQ Telemetry Transport protocol versions 3.1 and 3.1.1. MQTT provides a
lightweight method of carrying out messaging using a publish/subscribe model.
This makes it suitable for "machine to machine" messaging such as with low
power sensors or mobile devices such as phones, embedded computers or
microcontrollers like the Arduino. A good example of this is all of the work
that Andy Stanford-Clark (one of the originators of MQTT) has done in home
monitoring and automation with his twittering house and twittering ferry.
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Backports:SLE-15-SP6/mosquitto && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
README-ca_certificates | 0000000073 73 Bytes | |
README-certs | 0000000130 130 Bytes | |
README-conf-d | 0000000142 142 Bytes | |
mosquitto-1.4.1_apparmor.patch | 0000000773 773 Bytes | |
mosquitto-1.6.8-config.patch | 0000000471 471 Bytes | |
mosquitto-2.0.18.tar.gz | 0000796351 778 KB | |
mosquitto-2.0.18.tar.gz.sig | 0000000833 833 Bytes | |
mosquitto.changes | 0000075687 73.9 KB | |
mosquitto.keyring | 0000012218 11.9 KB | |
mosquitto.service | 0000000634 634 Bytes | |
mosquitto.spec | 0000007663 7.48 KB |
Latest Revision
Yuchen Lin (maxlin_factory)
accepted
request 1135795
from
Dirk Mueller (dirkmueller)
(revision 5)
- update to 2.0.18 (bsc#1214918, CVE-2023-28366, bsc#1215865, CVE-2023-0809, bsc#1215864, CVE-2023-3592): * Fix crash on subscribe under certain unlikely conditions. * Fix mosquitto_rr not honouring `-R`. Closes #2893. * Fix `max_queued_messages 0` stopping clients from receiving messages. * Fix `max_inflight_messages` not being set correctly. * Fix `mosquitto_passwd -U` backup file creation. * CVE-2023-28366: Fix memory leak in broker when clients send multiple QoS 2 messages with the same message ID, but then never respond to the PUBREC commands. * CVE-2023-0809: Fix excessive memory being allocated based on malicious initial packets that are not CONNECT packets. * CVE-2023-3592: Fix memory leak when clients send v5 CONNECT packets with a will message that contains invalid property types. * Broker will now reject Will messages that attempt to publish to $CONTROL/. * Broker now validates usernames provided in a TLS certificate or TLS-PSK identity are valid UTF-8. * Fix potential crash when loading invalid persistence file. * Library will no longer allow single level wildcard certificates, e.g. *.com * Fix $SYS messages being expired after 60 seconds and hence unchanged values disappearing. * Fix some retained topic memory not being cleared immediately after used. * Fix error handling related to the `bind_interface` option. * Fix std* files not being redirected when daemonising, when built with assertions removed.
Comments 0