<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">icinga2-2.13.1-1.3 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10856-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">icinga2-2.13.1-1.3 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the icinga2-2.13.1-1.3 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10856</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16933/</URL>
      <Description>SUSE CVE CVE-2017-16933 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-6534/</URL>
      <Description>SUSE CVE CVE-2018-6534 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14004/</URL>
      <Description>SUSE CVE CVE-2020-14004 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29663/</URL>
      <Description>SUSE CVE CVE-2020-29663 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-32739/</URL>
      <Description>SUSE CVE CVE-2021-32739 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-32743/</URL>
      <Description>SUSE CVE CVE-2021-32743 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-37698/</URL>
      <Description>SUSE CVE CVE-2021-37698 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="icinga2-2.13.1-1.3">
      <FullProductName ProductID="icinga2-2.13.1-1.3">icinga2-2.13.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga2-bin-2.13.1-1.3">
      <FullProductName ProductID="icinga2-bin-2.13.1-1.3">icinga2-bin-2.13.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga2-common-2.13.1-1.3">
      <FullProductName ProductID="icinga2-common-2.13.1-1.3">icinga2-common-2.13.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga2-doc-2.13.1-1.3">
      <FullProductName ProductID="icinga2-doc-2.13.1-1.3">icinga2-doc-2.13.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga2-ido-mysql-2.13.1-1.3">
      <FullProductName ProductID="icinga2-ido-mysql-2.13.1-1.3">icinga2-ido-mysql-2.13.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga2-ido-pgsql-2.13.1-1.3">
      <FullProductName ProductID="icinga2-ido-pgsql-2.13.1-1.3">icinga2-ido-pgsql-2.13.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nano-icinga2-2.13.1-1.3">
      <FullProductName ProductID="nano-icinga2-2.13.1-1.3">nano-icinga2-2.13.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vim-icinga2-2.13.1-1.3">
      <FullProductName ProductID="vim-icinga2-2.13.1-1.3">vim-icinga2-2.13.1-1.3</FullProductName>
    </Branch>
    <Relationship ProductReference="icinga2-2.13.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga2-2.13.1-1.3">icinga2-2.13.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga2-bin-2.13.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga2-bin-2.13.1-1.3">icinga2-bin-2.13.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga2-common-2.13.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga2-common-2.13.1-1.3">icinga2-common-2.13.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga2-doc-2.13.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga2-doc-2.13.1-1.3">icinga2-doc-2.13.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga2-ido-mysql-2.13.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga2-ido-mysql-2.13.1-1.3">icinga2-ido-mysql-2.13.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga2-ido-pgsql-2.13.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga2-ido-pgsql-2.13.1-1.3">icinga2-ido-pgsql-2.13.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nano-icinga2-2.13.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nano-icinga2-2.13.1-1.3">nano-icinga2-2.13.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-icinga2-2.13.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:vim-icinga2-2.13.1-1.3">vim-icinga2-2.13.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">etc/initsystem/prepare-dirs in Icinga 2.x through 2.8.1 has a chown call for a filename in a user-writable directory, which allows local users to gain privileges by leveraging access to the $ICINGA2_USER account for creation of a link.</Note>
    </Notes>
    <CVE>CVE-2017-16933</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icinga2-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-bin-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-common-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-doc-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-mysql-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-pgsql-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nano-icinga2-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-icinga2-2.13.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16933.html</URL>
        <Description>CVE-2017-16933</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086673</URL>
        <Description>SUSE Bug 1086673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086676</URL>
        <Description>SUSE Bug 1086676</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted messages, an attacker can cause a NULL pointer dereference, which can cause the product to crash.</Note>
    </Notes>
    <CVE>CVE-2018-6534</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icinga2-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-bin-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-common-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-doc-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-mysql-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-pgsql-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nano-icinga2-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-icinga2-2.13.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6534.html</URL>
        <Description>CVE-2018-6534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086674</URL>
        <Description>SUSE Bug 1086674</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Icinga2 before v2.12.0-rc1. The prepare-dirs script (run as part of the icinga2 systemd service) executes chmod 2750 /run/icinga2/cmd. /run/icinga2 is under control of an unprivileged user by default. If /run/icinga2/cmd is a symlink, then it will by followed and arbitrary files can be changed to mode 2750 by the unprivileged icinga2 user.</Note>
    </Notes>
    <CVE>CVE-2020-14004</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icinga2-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-bin-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-common-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-doc-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-mysql-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-pgsql-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nano-icinga2-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-icinga2-2.13.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14004.html</URL>
        <Description>CVE-2020-14004</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172171</URL>
        <Description>SUSE Bug 1172171</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Icinga 2 v2.8.0 through v2.11.7 and v2.12.2 has an issue where revoked certificates due for renewal will automatically be renewed, ignoring the CRL. This issue is fixed in Icinga 2 v2.11.8 and v2.12.3.</Note>
    </Notes>
    <CVE>CVE-2020-29663</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icinga2-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-bin-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-common-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-doc-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-mysql-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-pgsql-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nano-icinga2-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-icinga2-2.13.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29663.html</URL>
        <Description>CVE-2020-29663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180147</URL>
        <Description>SUSE Bug 1180147</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. From version 2.4.0 through version 2.12.4, a vulnerability exists that may allow privilege escalation for authenticated API users. With a read-ony user's credentials, an attacker can view most attributes of all config objects including `ticket_salt` of `ApiListener`. This salt is enough to compute a ticket for every possible common name (CN). A ticket, the master node's certificate, and a self-signed certificate are enough to successfully request the desired certificate from Icinga. That certificate may in turn be used to steal an endpoint or API user's identity. Versions 2.12.5 and 2.11.10 both contain a fix the vulnerability. As a workaround, one may either specify queryable types explicitly or filter out ApiListener objects.</Note>
    </Notes>
    <CVE>CVE-2021-32739</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icinga2-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-bin-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-common-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-doc-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-mysql-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-pgsql-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nano-icinga2-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-icinga2-2.13.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-32739.html</URL>
        <Description>CVE-2021-32739</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188372</URL>
        <Description>SUSE Bug 1188372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions prior to 2.11.10 and from version 2.12.0 through version 2.12.4, some of the Icinga 2 features that require credentials for external services expose those credentials through the API to authenticated API users with read permissions for the corresponding object types. IdoMysqlConnection and IdoPgsqlConnection (every released version) exposes the password of the user used to connect to the database. IcingaDB (added in 2.12.0) exposes the password used to connect to the Redis server. ElasticsearchWriter (added in 2.8.0)exposes the password used to connect to the Elasticsearch server. An attacker who obtains these credentials can impersonate Icinga to these services and add, modify and delete information there. If credentials with more permissions are in use, this increases the impact accordingly. Starting with the 2.11.10 and 2.12.5 releases, these passwords are no longer exposed via the API. As a workaround, API user permissions can be restricted to not allow querying of any affected objects, either by explicitly listing only the required object types for object query permissions, or by applying a filter rule.</Note>
    </Notes>
    <CVE>CVE-2021-32743</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icinga2-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-bin-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-common-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-doc-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-mysql-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-pgsql-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nano-icinga2-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-icinga2-2.13.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-32743.html</URL>
        <Description>CVE-2021-32743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188370</URL>
        <Description>SUSE Bug 1188370</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions 2.5.0 through 2.13.0, ElasticsearchWriter, GelfWriter, InfluxdbWriter and Influxdb2Writer do not verify the server's certificate despite a certificate authority being specified. Icinga 2 instances which connect to any of the mentioned time series databases (TSDBs) using TLS over a spoofable infrastructure should immediately upgrade to version 2.13.1, 2.12.6, or 2.11.11 to patch the issue. Such instances should also change the credentials (if any) used by the TSDB writer feature to authenticate against the TSDB. There are no workarounds aside from upgrading.</Note>
    </Notes>
    <CVE>CVE-2021-37698</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icinga2-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-bin-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-common-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-doc-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-mysql-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-pgsql-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nano-icinga2-2.13.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-icinga2-2.13.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-37698.html</URL>
        <Description>CVE-2021-37698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189653</URL>
        <Description>SUSE Bug 1189653</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
