This is an announcement for an upcoming security release of Checkmk. Having
such a pre-announcement was requested especially by users in larger or
regulated environments, who need time to prepare updates and align with
other teams.
We are thus announcing the upcoming security release to help you estimate
how your setup is affected and to plan your patch roll-out.
On Thursday, October 9th, we will publish a patch release for all currently
supported versions of Checkmk: 2.2.0, 2.3.0 and 2.4.0. The patch will
contain fixes for three vulnerabilities, two of which have a high severity.
All editions of Checkmk are affected.
Further information about the vulnerabilities:
A vulnerability in a plugin for the Windows agent could allow
low-privileged users on the Windows host to escalate privileges to Local
System.
Authenticated users in Checkmk could be able to break the configuration
of the site, causing a denial-of-service.
Under certain unlikely circumstances, sensitive information entered by
the user could be leaked via the URL.
We greatly thank you for using Checkmk and wish you a successful monitoring,
Hey Brian, this is more a heads-up, that there will be a security release, so that customers, which have processes around updating critical software can plan ahead and block a slot for updating Checkmk on that day.
We only provide details on the day of the release on purpose.
Have to see it positively. We are perceived to be relevant enough now that people talk about it
We will still be as transparent as we have been in our history on any security topic.
I recommend our video on how we deal with security vulnerabilities: https://www.youtube.com/watch?v=SxWhx0-BJ3Y
as this is a core functionality we verified this functionalities successfully in QA with several installations and in different setup it seems like not to be a general issue with this patch.
We would like to investigate this further and need from you to know from which version to which version you updated, uploading the crash dump if possible.
If you have support, please use the support ticket for it, so we have more context about this case, otherwise I would ask you to open a new thread for that as it seems to be not a general issue with the patch - though we want to investigate that further.
If it turns out that its a more general issue we would update all users in this thread as well of course.