mirror of
https://github.com/Icinga/icinga2.git
synced 2025-09-22 17:28:02 +02:00
Icinga 2.12.12
This commit is contained in:
parent
9b2c05d0cc
commit
a0ec7f6b2f
15
CHANGELOG.md
15
CHANGELOG.md
@ -7,6 +7,21 @@ documentation before upgrading to a new release.
|
||||
|
||||
Released closed milestones can be found on [GitHub](https://github.com/Icinga/icinga2/milestones?state=closed).
|
||||
|
||||
## 2.12.12 (2025-05-27)
|
||||
|
||||
This security release fixes a critical issue in the certificate renewal logic in Icinga 2, which
|
||||
might incorrectly renew an invalid certificate. However, only nodes with access to the Icinga CA
|
||||
private key running with OpenSSL older than version 1.1.0 (released in 2016) are vulnerable. So this
|
||||
typically affects Icinga 2 masters running on operating systems like RHEL 7 and Amazon Linux 2.
|
||||
|
||||
* CVE-2025-48057: Prevent invalid certificates from being renewed with OpenSSL older than v1.1.0.
|
||||
* Fix use-after-free in VerifyCertificate(): Additionally, a use-after-free was found in the same
|
||||
function which is fixed as well, but in case it is triggered, typically only a wrong error code
|
||||
may be shown in a log message.
|
||||
* Windows: Update OpenSSL shipped on Windows to v3.0.16. #10455
|
||||
* Windows: Fix unknown ctest(1) `--log_level` argument. #10453
|
||||
* Don't require to build .msi as admin. #10454
|
||||
|
||||
## 2.12.11 (2024-11-12)
|
||||
|
||||
This security release fixes a TLS certificate validation bypass.
|
||||
|
@ -1,2 +1,2 @@
|
||||
Version: 2.12.11
|
||||
Version: 2.12.12
|
||||
Revision: 1
|
||||
|
Loading…
x
Reference in New Issue
Block a user