Your message dated Fri, 15 Nov 2024 17:47:08 +0000
with message-id <e1tc0pu-004usk...@fasolo.debian.org>
and subject line Bug#1087384: fixed in icinga2 2.13.6-2+deb12u2
has caused the Debian Bug report #1087384,
regarding CVE-2024-49369: Security: fix TLS certificate validation bypass.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1087384: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087384
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: icinga2
Version: 2.14.2-1
Severity: grave
Tags: upstream security
Justification: user security hole
X-Debbugs-Cc: Debian Security Team <t...@security.debian.org>

Dear Maintainer,

I'm pretty sure you're aware, nevertheless here is the but report:

https://icinga.com/blog/2024/11/12/critical-icinga-2-security-releases-2-14-3/

Today, we are releasing security updates for Icinga 2 fixing a
critical vulnerability that allowed to bypass the certificate
validation for JSON-RPC and HTTP API connections.
Impact

The TLS certificate validation in all Icinga 2 versions starting
from 2.4.0 was flawed, allowing an attacker to impersonate both
trusted cluster nodes as well as any API users that use TLS
client certificates for authentication (ApiUser objects with the
client_cn attribute set).

By impersonating a trusted cluster node like a master or satellite,
an attacker can supply a malicious configuration update to other
nodes (if the accept_config attribute of the ApiListener object is
set to true) or instruct the other node to execute malicious commands
directly (if the accept_commands attribute of the ApiListener object
is set to true). These attributes are expected to be set in most
distributed installations, but in case they are not, an attacker
can still retrieve potentially sensitive information.

When impersonating API users, the impact depends on the permissions
configured for the individual users using certificate authentication.
This may include permissions like updating the configuration and
executing commands as well.

We expect most installations to be affected by this vulnerability
and recommend upgrading as soon as possible.

P.S.S Ignore the version information below, however stable & oldstable
are affected too.

Hilmar

-- System Information:
Debian Release: 12.8
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: arm64 (aarch64)
Foreign Architectures: armhf

Kernel: Linux 6.6.51+rpt-rpi-v8 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_CRAP
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: icinga2
Source-Version: 2.13.6-2+deb12u2
Done: Bas Couwenberg <sebas...@debian.org>

We believe that the bug you reported is fixed in the latest version of
icinga2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1087...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bas Couwenberg <sebas...@debian.org> (supplier of updated icinga2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 12 Nov 2024 18:57:26 +0100
Source: icinga2
Architecture: source
Version: 2.13.6-2+deb12u2
Distribution: bookworm
Urgency: medium
Maintainer: Debian Nagios Maintainer Group 
<pkg-nagios-de...@lists.alioth.debian.org>
Changed-By: Bas Couwenberg <sebas...@debian.org>
Closes: 1087384
Changes:
 icinga2 (2.13.6-2+deb12u2) bookworm; urgency=medium
 .
   * Team upload.
   * Add upstream patch to fix CVE-2024-49369.
     (closes: #1087384)
Checksums-Sha1:
 31fb31025f277ca60e2b3638e6903d522d286f67 2782 icinga2_2.13.6-2+deb12u2.dsc
 d310f1405a0890cdf14fe61c9dc4bca7205109c0 25216 
icinga2_2.13.6-2+deb12u2.debian.tar.xz
 cef9dfcec03184f0e216c850dcef78c9046592a9 12352 
icinga2_2.13.6-2+deb12u2_amd64.buildinfo
Checksums-Sha256:
 efcabe96a5762e9680a86d0507b8443e281bca4e9ba4baf4b0ea00e89a9d3efc 2782 
icinga2_2.13.6-2+deb12u2.dsc
 2044bb0b211e8f709688bb92e2deae8c3287e96271d7b91ac0b6556f53581ec8 25216 
icinga2_2.13.6-2+deb12u2.debian.tar.xz
 8c49cac4dca096f0f49595653649a8ce694f0562d858464d0083ae6cf575601e 12352 
icinga2_2.13.6-2+deb12u2_amd64.buildinfo
Files:
 e6f0c308c7b6185763a80268421ae140 2782 admin optional 
icinga2_2.13.6-2+deb12u2.dsc
 7cf31457b398e474ba8141922361d71d 25216 admin optional 
icinga2_2.13.6-2+deb12u2.debian.tar.xz
 25d3d4fc00df0b5e30d8ff554386ca56 12352 admin optional 
icinga2_2.13.6-2+deb12u2_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=aNiX
-----END PGP SIGNATURE-----

Attachment: pgpk0ce9uedDW.pgp
Description: PGP signature


--- End Message ---

Reply via email to