Icinga 2.12.12

This commit is contained in:
Julian Brost 2025-05-20 16:45:41 +02:00 committed by Yonas Habteab
parent 9b2c05d0cc
commit a0ec7f6b2f
2 changed files with 16 additions and 1 deletions

View File

@ -7,6 +7,21 @@ documentation before upgrading to a new release.
Released closed milestones can be found on [GitHub](https://github.com/Icinga/icinga2/milestones?state=closed).
## 2.12.12 (2025-05-27)
This security release fixes a critical issue in the certificate renewal logic in Icinga 2, which
might incorrectly renew an invalid certificate. However, only nodes with access to the Icinga CA
private key running with OpenSSL older than version 1.1.0 (released in 2016) are vulnerable. So this
typically affects Icinga 2 masters running on operating systems like RHEL 7 and Amazon Linux 2.
* CVE-2025-48057: Prevent invalid certificates from being renewed with OpenSSL older than v1.1.0.
* Fix use-after-free in VerifyCertificate(): Additionally, a use-after-free was found in the same
function which is fixed as well, but in case it is triggered, typically only a wrong error code
may be shown in a log message.
* Windows: Update OpenSSL shipped on Windows to v3.0.16. #10455
* Windows: Fix unknown ctest(1) `--log_level` argument. #10453
* Don't require to build .msi as admin. #10454
## 2.12.11 (2024-11-12)
This security release fixes a TLS certificate validation bypass.

View File

@ -1,2 +1,2 @@
Version: 2.12.11
Version: 2.12.12
Revision: 1