In Eclipse Mosquito before and including 2.0.5, establishing a connection to the mosquitto server without sending data causes the EPOLLOUT event to be added, which results excessive CPU consumption. This could be used by a malicious actor to perform denial of service type attack. This issue is fixed in 2.0.6
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"339340532613465271204693980858278238153",
"136292289744382020139876670180840970972",
"21869194843853891625861881781520145664",
"285141719073239596503475120037193743720"
]
},
"target": {
"file": "lib/packet_mosq.c"
},
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"source": "https://github.com/eclipse-mosquitto/mosquitto/commit/18bad1ff32435e523d7507e9b2ce0010124a8f2d",
"id": "CVE-2023-5632-2ab895b3"
},
{
"digest": {
"function_hash": "68487489615421562917012134159900078294",
"length": 3121.0
},
"target": {
"function": "packet__write",
"file": "lib/packet_mosq.c"
},
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"source": "https://github.com/eclipse-mosquitto/mosquitto/commit/18bad1ff32435e523d7507e9b2ce0010124a8f2d",
"id": "CVE-2023-5632-580bb959"
}
]