libmosquittopp-dev - MQTT version 3.1 client C++ library, development files

Property Value
Distribution Ubuntu 18.04 LTS (Bionic Beaver)
Repository Ubuntu Updates Universe i386
Package filename libmosquittopp-dev_1.4.15-2ubuntu0.18.04.3_i386.deb
Package name libmosquittopp-dev
Package version 1.4.15
Package release 2ubuntu0.18.04.3
Package architecture i386
Package type deb
Category universe/libdevel
License -
Maintainer Ubuntu Developers <>
Download size 7.14 KB
Installed size 55.00 KB
This is the header and man page for the libmosquittopp1 C++ library, which is
a library for implementing MQTT version 3.1 clients. This package is needed to
do development with libmosquittopp1.


Package Version Architecture Repository
libmosquittopp-dev_1.4.15-2ubuntu0.18.04.3_amd64.deb 1.4.15 amd64 Ubuntu Updates Universe
libmosquittopp-dev_1.4.15-2_i386.deb 1.4.15 i386 Ubuntu Universe
libmosquittopp-dev_1.4.15-2_amd64.deb 1.4.15 amd64 Ubuntu Universe
libmosquittopp-dev - - -


Name Value
libmosquitto-dev -
libmosquittopp1 >= 1.4.15-2ubuntu0.18.04.3
libmosquittopp1 << 1.4.15-2ubuntu0.


Name Value
libmosquittopp0-dev << 1.2-1~


Type URL
Binary Package libmosquittopp-dev_1.4.15-2ubuntu0.18.04.3_i386.deb
Source Package mosquitto

Install Howto

  1. Update the package index:
    # sudo apt-get update
  2. Install libmosquittopp-dev deb package:
    # sudo apt-get install libmosquittopp-dev




2019-06-18 - Eduardo Barretto <>
mosquitto (1.4.15-2ubuntu0.18.04.3) bionic-security; urgency=medium
* SECURITY UPDATE: DoS (client disconnect) via invalid UTF-8 strings
- debian/patches/add-validate-utf8.patch: Add validate UTF-8
- debian/patches/CVE-2017-7653.patch: Add UTF-8 tests, plus some validation
- CVE-2017-7653
* SECURITY UPDATE: Memory leak in the Mosquitto Broker allows unauthenticated
clients to send crafted CONNECT packets which could cause DoS
- debian/patches/CVE-2017-7654.patch: Fix memory leak that could be caused
by a malicious CONNECT packet
- CVE-2017-7654
2019-02-13 - Roger A. Light <>
mosquitto (1.4.15-2ubuntu0.18.04.2) bionic-security; urgency=medium
* Fix regression in update for CVE-2018-12546.
2019-02-06 - Roger A. Light <>
mosquitto (1.4.15-2ubuntu0.18.04.1) bionic-security; urgency=medium
* SECURITY UPDATE: If Mosquitto is configured to use a password file for
authentication, any malformed data in the password file will be treated as
valid. This typically means that the malformed data becomes a username and
no password. If this occurs, clients can circumvent authentication and get
access to the broker by using the malformed username. In particular, a blank
line will be treated as a valid empty username. Other security measures are
unaffected. Users who have only used the mosquitto_passwd utility to create
and modify their password files are unaffected by this vulnerability.
- debian/patches/mosquitto-1.4.x-cve-2018-12551.patch: this fix introduces
more stringent parsing tests on the password file data.
- CVE-2018-12551
* SECURITY UPDATE: If an ACL file is empty, or has only blank lines or
comments, then mosquitto treats the ACL file as not being defined, which
means that no topic access is denied. Although denying access to all
topics is not a useful configuration, this behaviour is unexpected and
could lead to access being incorrectly granted in some circumstances.
- debian/patches/mosquitto-1.4.x-cve-2018-12550.patch: this fix ensures
that if an ACL file is defined but no rules are defined, then access will
be denied.
- CVE-2018-12550
* SECURITY UPDATE: If a client publishes a retained message to a topic that
they have access to, and then their access to that topic is revoked, the
retained message will still be delivered to future subscribers. This
behaviour may be undesirable in some applications, so a configuration
option `check_retain_source` has been introduced to enforce checking of
the retained message source on publish.
- debian/patches/mosquitto-1.4.15-cve-2018-12546.patch: this patch stores
the originator of the retained message, so security checking can be
carried out before re-publishing. The complexity of the patch is due to
the need to save this information across broker restarts.
- CVE-2018-12546
2018-04-07 - Roger A. Light <>
mosquitto (1.4.15-2) unstable; urgency=low
* Replace mentions of 'c_rehash' with 'openssl rehash'. (Closes: #895084).

See Also

Package Description
libmosquittopp1_1.4.15-2ubuntu0.18.04.3_i386.deb MQTT version 3.1/3.1.1 client C++ library
libmpx2-amd64-cross_8.3.0-6ubuntu1~18.04.1cross1_all.deb Intel memory protection extensions (runtime)
libmpx2-dbg-amd64-cross_8.3.0-6ubuntu1~18.04.1cross1_all.deb Intel memory protection extensions (debug symbols)
libmpx2-dbg-i386-cross_8.3.0-6ubuntu1~18.04.1cross1_all.deb Intel memory protection extensions (debug symbols)
libmpx2-i386-cross_8.3.0-6ubuntu1~18.04.1cross1_all.deb Intel memory protection extensions (runtime)
libmsv-java_2009.1+dfsg1-6~18.04_all.deb Sun multi-schema XML validator
libmysofa-dev_0.6~dfsg0-2ubuntu0.18.04.1_i386.deb library to read HRTFs stored in the AES69-2015 SOFA format - development files
libmysofa-utils_0.6~dfsg0-2ubuntu0.18.04.1_i386.deb library to read HRTFs stored in the AES69-2015 SOFA format - utilities
libmysofa0_0.6~dfsg0-2ubuntu0.18.04.1_i386.deb library to read HRTFs stored in the AES69-2015 SOFA format
libn32atomic1-dbg-mips-cross_8.2.0-1ubuntu2~18.04cross1_all.deb support library providing __atomic built-in functions (n32 debug symbols)
libn32atomic1-dbg-mips-cross_8.3.0-6ubuntu1~18.04.1cross1_all.deb support library providing __atomic built-in functions (n32 debug symbols)
libn32atomic1-dbg-mips64-cross_8.2.0-1ubuntu2~18.04cross1_all.deb support library providing __atomic built-in functions (n32 debug symbols)
libn32atomic1-dbg-mips64-cross_8.3.0-6ubuntu1~18.04.1cross1_all.deb support library providing __atomic built-in functions (n32 debug symbols)
libn32atomic1-dbg-mips64el-cross_8.2.0-1ubuntu2~18.04cross1_all.deb support library providing __atomic built-in functions (n32 debug symbols)
libn32atomic1-dbg-mips64el-cross_8.3.0-6ubuntu1~18.04.1cross1_all.deb support library providing __atomic built-in functions (n32 debug symbols)