[Release] Checkmk stable release 2.2.0p15

Dear friends of Checkmk,

the new stable release 2.2.0p15 of Checkmk is ready for download.

This stable release ships with 29 changes affecting all editions of Checkmk,
3 changes for the Enterprise editions, 0 Cloud Edition specific and
1 Managed Services Edition specific changes.

Changes in all Checkmk Editions:

Agent bakery

  • 15309 FIX: mk_oracle: broken section due to missing redirect…

Checks & agents

  • 15311 FIX: align quoting of synchronous and asynchronous MRPE…
    NOTE: Please refer to the migration notes!
  • 14217 FIX: No longer sporadically report stale services which are based on piggyback data…
  • 16216 FIX: Resolve Runas section in Checkmk Linux agent…
  • 16294 FIX: ibm_imm_temp: Fix ValueError (could not convert string to float: ‘’)…
  • 16297 FIX: juniper_trpz_cpu_util: fix TypeError (‘>=’ not supported between instances of ‘float’ and ‘NoneType’)…
  • 15303 FIX: logwatch_ec: remove spool files after reading them…
  • 15307 FIX: logwatch_ec: tcp remote forwarding: create one spool file per service…
  • 15310 FIX: oracle_crs_res: TypeError: Resource.init() got an unexpected keyword argument ‘enabled’…
  • 15921 FIX: primekey_data: Fix parsing crash when HSM Status isn’t available…

Core & setup

  • 16144 FIX: Ignore piggybacked host names starting with a period…
    NOTE: Please refer to the migration notes!

HW/SW inventory

  • 16008 FIX: HW/SW Inventory Retention Intervals: Take all matching entries into account

REST API

  • 16278 FIX: downtimes: can now delete downtimes from remote sites…
  • 16160 FIX: host_config: can now move host between nested folders…

Setup

  • 16288 audit log: Add options to hide object and object type…
  • 16224 SEC: CSRF in user-message deletion…
  • 16219 SEC: Limit length of Hostname…
  • 16221 SEC: Livestatus Injections…
  • 15195 SEC: Protect automation user secret against timing attacks…
  • 15101 FIX: broken autocomplete select fields…
  • 15196 FIX: Allow CA certificates without key usage restrictions…
  • 15454 FIX: Fix color of Perf-O-Meter for CPU utilization…
  • 16290 FIX: Limit login to single session: modify sessions lookup to enable the option…
  • 16280 FIX: ical imports: valid iCalendar files not being accepted on import…

Site management

  • 16229 Provide Checkmk builds for Ubuntu 23.10 (Mantic Minotaur)…
  • 16231 FIX: Cease to provide builds for Ubuntu 22.10 (Kinetic Kudu)…
    NOTE: Please refer to the migration notes!
  • 16298 FIX: Avoid duplicate port allocations within the same site…

User interface

  • 16299 FIX: Fix inconsistent interaction for graphs in dashboards…
  • 14216 FIX: Prevent LDAP users from disappearing at remote sites…

Changes in the Checkmk Enterprise Edition:

Core & setup

  • 16145 FIX: “Always up” hosts can always notify…

Metrics system

  • 16300 FIX: Revert werk #16150 and fix IndexError: boolean index did not match indexed array along dimension 0 in forecast graphs…

User interface

  • 16303 FIX: Fix “Metric history” context filter on view edit…

Changes in the Checkmk Cloud Edition:

NO CHANGES

Changes in the Checkmk Managed Services Edition:

Setup

  • 16281 FIX: event console: rule changes now only apply to the customer sites that were changed…

You can download Checkmk from our download page: Download Checkmk for free | Checkmk

List of all changes: Werks

We greatly thank you for using Checkmk and wish you a successful monitoring,

Your Checkmk Team

In the CRE deb package for Ubuntu 22.04 (and probably others), there is a bug with active checks that depend on openssl, e.g. check_http, check_ftp, check_tcp etc. These checks go critical after the update, saying

(Return code of 127 is out of bounds - plugin may be missing)

Workaround:

Symlink the old libraries like so (you might need to adapt the paths to your environment):

cd /opt/omd/versions/2.2.0p15.cre/lib
ln -s /opt/omd/versions/2.2.0p14.cre/lib/libcrypto.so.1.1
ln -s /opt/omd/versions/2.2.0p14.cre/lib/libssl.so.1.1

I have already notified feedback@checkmk.com about this.

4 Likes

Hi @Jay2k1,
I cannot reproduce this issue (yet).
What I tried:

  • installed a fresh p14 raw, created a host with a HTTPs check. Works as expected
  • upgraded in place to p15 raw, started the site. Again, works as expected

Can you please show me, what the service detail page shows about the service check command:
image

@Jay2k1 I think we found it, and we will most probably de-publish that version.
Thanks for reporting that, and sorry for the trouble.

1 Like

We de-published version p15.

3 Likes

is that the reason why you removed the latest tag from docker hub?

Could not do a head request for “checkmk/check-mk-raw:latest”, falling back to regular pull.
Reason: registry responded to head request with “404 Not Found”, auth: “not present”
Unable to update container “/checkmk”: Error response from daemon: manifest for checkmk/check-mk-raw:latest not found: manifest unknown: manifest unknown. Proceeding to next.

Thanks for the heads-up, the latest and 2.2.0-latest tags should now be available again and pointing to the correct version (2.2.0p14).

Thank you, it works again :slight_smile:

Do you know if there is a plan to fix and re-release 2.2.0p15 or will we need to wait for 2.2.0p16?

Hi @tonyt,

it will be a p16 AFAIK. The issue is not that simple, but the team is working on it. So please don’t ask for a when :slight_smile:

Should we wait for p16 or is there another way to patch

A CVSS 7.6 score is not something to postpone for to long IMHO.

Update on our side on both circumstances and current status:

In 2.2.0p15, we updated OpenSSL from 1.x to 3.x - a sensible thing to do from a security perspective. Fundamental changes like this are rather uncommon to be done in a patch release, thus we built quite some specific tests to ensure this change would not cause major issues.
All our internally built components worked without issues, however the monitoring plug-ins are not build vs OpenSSL 3.x currently. The change thus broke these checks in environments where OpenSSL 1.x is not installed on OS level. This specific case was not covered in our tests unfortunately due to build caches (Disclaimer: I lack the specific knowledge to be 100% sure, but this is what I understood from the discussions our devs had).
All customer sites, which were updated in advance as part of release testing, had OpenSSL 1.x installed already, so the issue didn’t appear there as well.
As we believe the active checks from the monitoring plugins used in Checkmk (e.g. check_http, check_tcp, …) are quite a fundamental piece and this would break monitoring for quite some users, we retracted the release.
To eliminate such problems in the future, we have on the one hand already improved our testing cases, and on the other hand are currently rewriting the most important active checks ourselves (check_http and as a consequence a complete new check_cert).

Where are we now regarding the release?
Yesterday, during release testing of 2.2.0p16, we discovered that some certificate checks went to CRITICAL - Cannot make SSL connection, which happens for hosts with deprecated cipher suits (as OpenSSL 3.x is quite harsh in this regard). This now requires a much more intricate handling, thus we decided to go back to OpenSSL 1.x until we have come up with a way how to handle such SSL connections. This gives us time to implement a proper solution now for this specific issue, and we hope that we can ship p16 in the coming days.

4 Likes

Please also check machines that were upgraded from Ubuntu 20.04 to 22.04. Incomplete updates were the reason that manual tests passed.

https://forum.checkmk.com/t/ubuntu-dist-upgrade-to-22-04-leaves-lots-of-old-packages/42885

1 Like