[//]: # (werk v2)
# Ruleset API: Fix migration with scaling of SimpleLevels
key | value
---------- | ---
date | 2024-04-17T11:19:36+00:00
version | 2.3.0b6
class | fix
edition | cre
component | checks
level | 1
compatible | no
This change is relevant to plugin developers
The migration helper functions `migrate_to_integer_simple_levels` and `migrate_to_float_simple_levels` for `SimpleLevels` currently apply the scaling factor (if given) every time the migration is run, meaning also to the already migrated value.
This means any rule where these helpers are used with a scaling factor will have incorrect values and will have to be manually corrected.
No shipped rules are affected by this.
[//]: # (werk v2)
# Microsoft SQL Server (Windows) ruleset is deprecated
key | value
---------- | ---
date | 2024-04-17T13:40:06+00:00
version | 2.3.0b6
class | feature
edition | cre
component | checks
level | 2
compatible | no
We've introduced a new plugin `Check MS SQL Server (Linux, Windows)` for MS SQL
database monitoring, see werk 15842 Enhanced MS SQL Server monitoring. The new
plugin extends the functionality of the `Microsoft SQL Server (Windows)` adding
more options and features.
We recommend upgrading to the `Check MS SQL Server (Linux, Windows)` plugin
for monitoring MS SQL databases. This new agent plugin can be deployed
alongside the Checkmk agent on your database systems, just like the previous
plugin. Alternatively, you can deploy this plugin on any Windows or Linux
server to monitor remote MSSQL servers over the network.
The previous rule `Microsoft SQL Server (Windows)` is deprecated and isn't
applied anymore.
[//]: # (werk v2)
# mk_postgres.py: Add 'PG_BINARY_PATH' to Bakery Rule
key | value
---------- | ---
date | 2024-04-16T15:15:06+00:00
version | 2.3.0b5
class | feature
edition | cee
component | agents
level | 1
compatible | yes
[Werk #15619](https://checkmk.com/werk/15619) added support for reading `PG_BINARY_PATH` from
`postgres.cfg`. This Werk allows setting this value with the agent bakery.
[//]: # (werk v2)
# Update OpenSSL to version 3.0.13
key | value
---------- | ---
date | 2024-04-17T10:08:23+00:00
version | 2.3.0b6
class | security
edition | cre
component | omd
level | 1
compatible | yes
OpenSSL was updated to version 3.0.13.
OpenSSL 3 uses requirements regarding allowed configurations, such as allowed ciphers, renegotiation, and so on.
In some scenarios, this can break monitoring for hosts with TLS configurations that are no longer considered secure.
We have published a blog post to help you mitigate these issues, should they affect you: https://checkmk.com/blog/how-monitor-servers-broken-tls-checkmk.
To aid automated scanning we assign a CVSS score of 0.0 (None) (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N).
[//]: # (werk v2)
# time_periods: Fix timeperiod iCalendar (ics) import
key | value
---------- | ---
date | 2024-04-17T09:19:29+00:00
version | 2.3.0b6
class | fix
edition | cre
component | wato
level | 1
compatible | yes
This Werk solves a problem with importing events that take more than
one day. Before this Werk, only the first day of the event was
imported. Now all days involved are imported.
[//]: # (werk v2)
# agent_netapp_ontap: handle shelves without elements
key | value
---------- | ---
date | 2024-04-10T12:26:35+00:00
version | 2.3.0b5
class | fix
edition | cre
component | checks
level | 1
compatible | yes
The agent did not handle the cases where shelves had no fans, temperature sensors or PSUs.
This led to crashes during the agent execution.
With this werk we now correctly handle these scenarios and the corresponding services are not discovered if no items are found.
[//]: # (werk v2)
# Just show an error message if redis is not reachable
key | value
---------- | ---
date | 2024-04-17T06:14:37+00:00
version | 2.3.0b6
class | fix
edition | cre
component | multisite
level | 1
compatible | yes
The mega menu search produced a crash report if redis was not reachable.
Now only an error message is shown.
[//]: # (werk v2)
# Brute-force protection ineffective for some login methods
key | value
---------- | ---
date | 2024-04-09T12:24:12+00:00
version | 2.3.0b5
class | security
edition | cre
component | wato
level | 1
compatible | yes
Prior to this Werk, the mechanism to lock user accounts after too many failed login attempts was only effective for the web form login method.
Login attempts via the REST API and basic authentication did not count towards the lockout mechanism.
As a result, an attacker could try to brute-force user passwords without triggering the lockout mechanism.
This Werk adds the same locking mechanism to login via the REST API and basic authentication _for human user accounts_.
Note that automation accounts are remain unaffected by the lockout mechanism to avoid having them locked by malicious intent.
It is therefore important to use long, random automation secrets.
This issue was found during internal review.
**Affected Versions**:
* 2.3.0 (beta)
* 2.2.0
* 2.1.0
* 2.0.0 (EOL)
**Mitigations**:
If updating is not possible, the brute-force attempts can be hindered by using a strong password policy.
**Vulnerability Management**:
We have rated the issue with a CVSS Score of 5.9 (Medium) with the following CVSS vector: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
and assigned CVE `CVE-2024-28825`.