Hi,
Sorry to be annoying here, but I just discovered that the stable version ist still vulnerable.

On Fri, 15 Nov 2024 05:12:08 +0100 Sebastiaan Couwenberg <sebas...@xs4all.nl> wrote:
On 11/14/24 9:05 PM, Louis-Philippe Véronneau wrote:
> I think this bug should be reopen and a security upload should be made ASAP 
to fix this critical issue.

It's not that critical, to quote the security tracker:

"
  [bookworm] - icinga2 <no-dsa> (Will be fixed via point release; Only affects 
deployments with access to Icinga API via client certificates)
"

The security tracker is wrong here, this bug affects (in all likelyhood) many if not most Icinga setups.
Any setup where the Icinga2 API is exposed to the network is vulnerable,
there is no need for an explicit API user with client certificates configured. Icinga 2 uses the same authentication mechanism for communication in a Icinga setup, meaning between different nodes (Icinga 2 instances, satellites/agents) and it uses Ceritificate based authentication for that.[0][1]

I just wanted to put some weight on the significance of this problem



The bookworm-pu has been submitted:

  https://bugs.debian.org/1087411

You can build the bookworm branch yourself if you want to deploy the fix sooner:

  https://salsa.debian.org/nagios-team/icinga2/-/tree/bookworm?ref_type=heads

Kind Regards,

Bas
Kind regards
Lorenz Kästle

[0] https://icinga.com/blog/critical-icinga-2-security-releases-2-14-3/
[1] https://icinga.com/blog/uncovering-a-client-certificate-verification-bypass-in-icinga/

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to