Title: event console: rule changes now only apply to the customer sites that were changed
Class: fix
Compatible: compat
Component: wato
Date: 1700545690
Edition: cme
Level: 1
Version: 2.3.0b1
Previously when changes were made to rulepack rules for the event console,
all sites received this change and therefore activate changes had to be
applied to all sites.
This werk introduces a change whereby any modifications to rulepacks
or rulepack rules are only applied to the customer's sites that they
are configured for.
Werk 16281 was deleted. The following Werk is no longer relevant.
Title: event console: rule changes now only apply to the customer sites that were changed
Class: fix
Compatible: compat
Component: wato
Date: 1700545690
Edition: cme
Level: 1
Version: 2.3.0b1
Previously when changes were made to rulepack rules for the event console,
all sites received this change and therefore activate changes had to be
applied to all sites.
This werk introduces a change whereby any modifications to rulepacks
or rulepack rules are only applied to the customer's sites that they
are configured for.
Title: event console: rule changes now only apply to the customer sites that were changed
Class: fix
Compatible: compat
Component: wato
Date: 1700545690
Edition: cme
Level: 1
Version: 2.3.0b1
Previously when changes were made to rulepack rules for the event console,
all sites received this change and therefore activate changes had to be
applied to all sites.
This werk introduces a change whereby any modifications to rulepacks
or rulepack rules are only applied to the customer's sites that they
are configured for.
Title: CSRF in user-message deletion
Class: security
Compatible: compat
Component: wato
Date: 1700648297
Edition: cre
Level: 1
Version: 2.1.0p37
In Checkmk you can message other users via <em>Send user message</em>.
Prior to this Werk an authenticated attacker who receives such a user-message could craft a link with the generated message uuid to delete the message.
This link was prone to CSRF and when another user was tricked into opening this link the message was deleted possibly before the user could read it.
LI: This vulnerability was identified through a commissioned penetration test conducted by Port Zero.
<b>Affected Versions</b>:
* 2.2.0
* 2.1.0
* 2.0.0
<b>Vulnerability Management</b>:
We have rated the issue with a CVSS Score of 3.5 (Low) with the following CVSS vector:
<tt>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N</tt>.
We assigned CVE-2023-6251 to this vulnerability.
<b>Changes</b>:
This Werk adds CSRF token validation to this endpoint.
Title: Livestatus Injections
Class: security
Compatible: compat
Component: wato
Date: 1700066363
Edition: cre
Level: 1
Version: 2.1.0p37
Prior to this Werk it was possible to inject arbitrary livestatus commands to the core via the WebUI.
We found this vulnerability internally.
<b>Affected Versions</b>:
* 2.2.0
* 2.1.0
* 2.0.0
<b>Vulnerability Management</b>:
We have rated the issue with a CVSS Score of 7.6 (High) with the following CVSS vector:
<tt>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</tt>.
We assigned CVE-2023-6156 and CVE-2023-6157 to these vulnerabilities.
<b>Changes</b>:
This Werk strips the relevant parameters of newlines.
Title: Fix inconsistent interaction for graphs in dashboards
Class: fix
Compatible: compat
Component: multisite
Date: 1700147621
Edition: cre
Level: 1
Version: 2.1.0p37
The mouse interaction (zooming, scrolling etc.) for graphs in dashboards only worked sporadically
and at seemingly random points.
Title: CSRF in user-message deletion
Class: security
Compatible: compat
Component: wato
Date: 1700648297
Edition: cre
Level: 1
Version: 2.2.0p15
In Checkmk you can message other users via <em>Send user message</em>.
Prior to this Werk an authenticated attacker who receives such a user-message could craft a link with the generated message uuid to delete the message.
This link was prone to CSRF and when another user was tricked into opening this link the message was deleted possibly before the user could read it.
LI: This vulnerability was identified through a commissioned penetration test conducted by Port Zero.
<b>Affected Versions</b>:
* 2.2.0
* 2.1.0
* 2.0.0
<b>Vulnerability Management</b>:
We have rated the issue with a CVSS Score of 3.5 (Low) with the following CVSS vector:
<tt>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N</tt>.
We assigned CVE-2023-6251 to this vulnerability.
<b>Changes</b>:
This Werk adds CSRF token validation to this endpoint.
Title: Livestatus Injections
Class: security
Compatible: compat
Component: wato
Date: 1700066363
Edition: cre
Level: 1
Version: 2.2.0p15
Prior to this Werk it was possible to inject arbitrary livestatus commands to the core via the WebUI.
We found this vulnerability internally.
<b>Affected Versions</b>:
* 2.2.0
* 2.1.0
* 2.0.0
<b>Vulnerability Management</b>:
We have rated the issue with a CVSS Score of 7.6 (High) with the following CVSS vector:
<tt>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</tt>.
We assigned CVE-2023-6156 and CVE-2023-6157 to these vulnerabilities.
<b>Changes</b>:
This Werk strips the relevant parameters of newlines.
Werk 16229 was adapted. The following is the new Werk, a diff is shown at the end of the message.
Title: Provide Checkmk builds for Ubuntu 23.10 (Mantic Minotaur)
Class: feature
Compatible: compat
Component: omd
Date: 1699612013
Edition: cre
Knowledge: undoc
Level: 1
Version: 2.2.0p15
Starting with this werk, we deliver builds for Ubuntu 23.10.
<b>PLEASE NOTE:</b>
This will be the last Ubuntu STS version for which Checkmk builds will be made publicly available. Since the next Ubuntu release 24.04 will be LTS, a smooth transition is guaranteed.
For details see: https://docs.checkmk.com/latest/en/update_matrix.html#ossupport
------------------------------------<diff>-------------------------------------------
- Title: Build Checkmk for Ubuntu-23.10 (mantic minotaur)
? ^^ - ^ ^ ^
+ Title: Provide Checkmk builds for Ubuntu 23.10 (Mantic Minotaur)
? ^^^^ + +++++++ ^ ^ ^
Class: feature
Compatible: compat
Component: omd
Date: 1699612013
Edition: cre
Knowledge: undoc
Level: 1
Version: 2.2.0p15
- With this werk, we deliver builds for Ubuntu-23.10.
? ^ ^
+ Starting with this werk, we deliver builds for Ubuntu 23.10.
? ^^^^^^^^^^ ^
<b>PLEASE NOTE:</b>
- This will be the last STS Ubuntu version we will provide to the public.
+ This will be the last Ubuntu STS version for which Checkmk builds will be made publicly available. Since the next Ubuntu release 24.04 will be LTS, a smooth transition is guaranteed.
- Have a look at https://docs.checkmk.com/latest/en/update_matrix.html#ossupport
? ^ ^ ^^^^^^^^^^
+ For details see: https://docs.checkmk.com/latest/en/update_matrix.html#ossupport
? ^^^^^^^ ^^^^^ ^^
-
-