Branch: refs/heads/2.1.0
Home:
https://github.com/Checkmk/checkmk
Commit: 60db5686ae59efe5aa89553be5f8b0148c68391d
https://github.com/Checkmk/checkmk/commit/60db5686ae59efe5aa89553be5f8b0148…
Author: Maximilian Wirtz <maximilian.wirtz(a)checkmk.com>
Date: 2023-07-25 (Tue, 25 Jul 2023)
Changed paths:
A .werks/15689
M Pipfile
M Pipfile.lock
M active_checks/check_bi_aggr
M agent-receiver/setup.py
M agents/cmk-agent-ctl/Cargo.lock
M buildscripts/infrastructure/build-nodes/scripts/install-openssl.sh
M buildscripts/infrastructure/build-nodes/scripts/install-python.sh
M cmk/gui/globals.py
M cmk/gui/utils/flashed_messages.py
M cmk/special_agents/agent_cisco_prime.py
M cmk/special_agents/agent_kube.py
M cmk/utils/http_proxy_config.py
M omd/packages/Python/Python.make
R omd/packages/openssl/openssl-1.1.1t.tar.gz
A omd/packages/openssl/openssl-1.1.1u.tar.gz
M omd/packages/openssl/openssl.make
M tests/testlib/openapi_session.py
M tests/unit/test_pipfile.py
Log Message:
-----------
15689 SEC Dependency updates
This Werk updates several dependencies such as openssl, various python dependencies, etc.
To our knowledge among the vulnerabilities fixed in those dependencies only CVE-2023-32681
could be exploited.
This vulnerability could cause a <tt>Proxy-Authorization</tt> header leakage.
<b>Vulnerability Management</b>:
We have rated the issue with a CVSS Score of 6.1 (Medium) with the following CVSS vector:
<tt>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N</tt>.
Change-Id: Ie9a102b41869ec64bdd043558945874c6bc92642