Skip to content

Commit 67072d3

Browse files
julianbrostjschmidt-icinga
authored andcommitted
Add security fixes to v2.14.7 changelog
1 parent 0d737e2 commit 67072d3

File tree

1 file changed

+15
-3
lines changed

1 file changed

+15
-3
lines changed

CHANGELOG.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,15 +9,27 @@ Released closed milestones can be found on [GitHub](https://github.com/Icinga/ic
99

1010
## 2.14.7 (2025-10-16)
1111

12-
This version includes a fix for sending signals and updates dependencies used
13-
in Windows builds.
12+
This release fixes multiple security issues. Two of them allow authenticated
13+
API users to learn restricted information or crash Icinga 2. A third issue
14+
affects the scripts provided with Icinga 2 and allows a limited privilege
15+
escalation where the Icinga 2 daemon user can trick root into sending signals to
16+
arbitrary processes.
1417

1518
Note that one fix affects the logrotate configuration. If it was modified
1619
locally, it might not be updated automatically by the package manager and
1720
applying the changes manually is necessary. For details, please check the
1821
[upgrading docs](https://icinga.com/docs/icinga-2/latest/doc/16-upgrading-icinga-2/#upgrading-to-2-15-1).
1922

20-
* Don't send signals as root in safe-reload script and logrotate config. #10597
23+
* CVE-2025-61907: Prevent API users from accessing variables and objects they
24+
don't have access to within filter expressions. This allowed authenticated
25+
API users to learn information they aren't allowed to access directly.
26+
* CVE-2025-61908: Add a missing null pointer check while evaluating
27+
expressions. This allowed authenticated API users to crash the Icinga 2
28+
daemon by supplying a crafted filter expression.
29+
* CVE-2025-61909: Don't send signals as root in safe-reload script and
30+
logrotate config. This allowed a limited privilege escalation from the Icinga
31+
2 service user to root. The scope is limited to sending SIGHUP or SIGUSR1 to
32+
an arbitrary process. #10597
2133
* Windows: Update to OpenSSL 3.0.18. #10595
2234
* Windows: upgrade build toolchain to Visual Studio 2022. #10594
2335

0 commit comments

Comments
 (0)