Bug#1087384: [Pkg-nagios-devel] Bug#1087384: Bug#1087384: CVE-2024-49369: Security: fix TLS certificate validation bypass.

2024-12-01 Thread Sebastiaan Couwenberg
On 12/1/24 10:10 PM, Lorenz wrote: Sorry to be annoying here, but I just discovered that the stable version ist still vulnerable. You can get the fixed version from bookworm-proposed-updates. https://www.debian.org/releases/proposed-updates https://wiki.debian.org/StableProposedUpdates Kin

Bug#1087384: [Pkg-nagios-devel] Bug#1087384: CVE-2024-49369: Security: fix TLS certificate validation bypass.

2024-12-01 Thread Lorenz
Hi, Sorry to be annoying here, but I just discovered that the stable version ist still vulnerable. On Fri, 15 Nov 2024 05:12:08 +0100 Sebastiaan Couwenberg wrote: On 11/14/24 9:05 PM, Louis-Philippe Véronneau wrote: > I think this bug should be reopen and a security upload should be made ASA

Bug#1087384: [Pkg-nagios-devel] Bug#1087384: CVE-2024-49369: Security: fix TLS certificate validation bypass.

2024-11-14 Thread Sebastiaan Couwenberg
On 11/14/24 9:05 PM, Louis-Philippe Véronneau wrote: I think this bug should be reopen and a security upload should be made ASAP to fix this critical issue. It's not that critical, to quote the security tracker: " [bookworm] - icinga2 (Will be fixed via point release; Only affects deployme

Bug#1087384: CVE-2024-49369: Security: fix TLS certificate validation bypass.

2024-11-14 Thread Louis-Philippe Véronneau
Hello, This bug was closed by an upload in unstable, but the Debian security trackers still says packages in stable are vulnerable: https://security-tracker.debian.org/tracker/CVE-2024-49369 I think this bug should be reopen and a security upload should be made ASAP to fix this critical issu

Bug#1087384: CVE-2024-49369: Security: fix TLS certificate validation bypass.

2024-11-12 Thread Hilmar Preusse
Source: icinga2 Version: 2.14.2-1 Severity: grave Tags: upstream security Justification: user security hole X-Debbugs-Cc: Debian Security Team Dear Maintainer, I'm pretty sure you're aware, nevertheless here is the but report: https://icinga.com/blog/2024/11/12/critical-icinga-2-security-releas