<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">icinga2-2.15.1-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:15644-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-10-17T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-10-17T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-10-17T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">icinga2-2.15.1-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the icinga2-2.15.1-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-15644</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61907/</URL>
      <Description>SUSE CVE CVE-2025-61907 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61908/</URL>
      <Description>SUSE CVE CVE-2025-61908 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61909/</URL>
      <Description>SUSE CVE CVE-2025-61909 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="icinga2-2.15.1-1.1">
      <FullProductName ProductID="icinga2-2.15.1-1.1">icinga2-2.15.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga2-bin-2.15.1-1.1">
      <FullProductName ProductID="icinga2-bin-2.15.1-1.1">icinga2-bin-2.15.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga2-common-2.15.1-1.1">
      <FullProductName ProductID="icinga2-common-2.15.1-1.1">icinga2-common-2.15.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga2-doc-2.15.1-1.1">
      <FullProductName ProductID="icinga2-doc-2.15.1-1.1">icinga2-doc-2.15.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga2-ido-mysql-2.15.1-1.1">
      <FullProductName ProductID="icinga2-ido-mysql-2.15.1-1.1">icinga2-ido-mysql-2.15.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga2-ido-pgsql-2.15.1-1.1">
      <FullProductName ProductID="icinga2-ido-pgsql-2.15.1-1.1">icinga2-ido-pgsql-2.15.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nano-icinga2-2.15.1-1.1">
      <FullProductName ProductID="nano-icinga2-2.15.1-1.1">nano-icinga2-2.15.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vim-icinga2-2.15.1-1.1">
      <FullProductName ProductID="vim-icinga2-2.15.1-1.1">vim-icinga2-2.15.1-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="icinga2-2.15.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga2-2.15.1-1.1">icinga2-2.15.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga2-bin-2.15.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga2-bin-2.15.1-1.1">icinga2-bin-2.15.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga2-common-2.15.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga2-common-2.15.1-1.1">icinga2-common-2.15.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga2-doc-2.15.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga2-doc-2.15.1-1.1">icinga2-doc-2.15.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga2-ido-mysql-2.15.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga2-ido-mysql-2.15.1-1.1">icinga2-ido-mysql-2.15.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga2-ido-pgsql-2.15.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga2-ido-pgsql-2.15.1-1.1">icinga2-ido-pgsql-2.15.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nano-icinga2-2.15.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nano-icinga2-2.15.1-1.1">nano-icinga2-2.15.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-icinga2-2.15.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:vim-icinga2-2.15.1-1.1">vim-icinga2-2.15.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Icinga 2 is an open source monitoring system. In Icinga 2 versions 2.4 through 2.15.0, filter expressions provided to the various /v1/objects endpoints could access variables or objects that would otherwise be inaccessible for the user. This allows authenticated API users to learn information that should be hidden from them, including global variables not permitted by the variables permission and objects not permitted by the corresponding objects/query permissions. The vulnerability is fixed in versions 2.15.1, 2.14.7, and 2.13.13.</Note>
    </Notes>
    <CVE>CVE-2025-61907</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icinga2-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-bin-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-common-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-doc-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-mysql-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-pgsql-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nano-icinga2-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-icinga2-2.15.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61907.html</URL>
        <Description>CVE-2025-61907</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1252261</URL>
        <Description>SUSE Bug 1252261</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Icinga 2 is an open source monitoring system. From 2.10.0 to before 2.15.1, 2.14.7, and 2.13.13, when creating an invalid reference, such as a reference to null, dereferencing results in a segmentation fault. This can be used by any API user with access to an API endpoint that allows specifying a filter expression to crash the Icinga 2 daemon. A fix is included in the following Icinga 2 versions: 2.15.1, 2.14.7, and 2.13.13.</Note>
    </Notes>
    <CVE>CVE-2025-61908</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icinga2-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-bin-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-common-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-doc-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-mysql-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-pgsql-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nano-icinga2-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-icinga2-2.15.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61908.html</URL>
        <Description>CVE-2025-61908</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1252263</URL>
        <Description>SUSE Bug 1252263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Icinga 2 is an open source monitoring system. From 2.10.0 to before 2.15.1, 2.14.7, and 2.13.13, the safe-reload script (also used during systemctl reload icinga2) and logrotate configuration shipped with Icinga 2 read the PID of the main Icinga 2 process from a PID file writable by the daemon user, but send the signal as the root user. This can allow the Icinga user to send signals to processes it would otherwise not permitted to. A fix is included in the following Icinga 2 versions: 2.15.1, 2.14.7, and 2.13.13.</Note>
    </Notes>
    <CVE>CVE-2025-61909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icinga2-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-bin-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-common-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-doc-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-mysql-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga2-ido-pgsql-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nano-icinga2-2.15.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-icinga2-2.15.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61909.html</URL>
        <Description>CVE-2025-61909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1252262</URL>
        <Description>SUSE Bug 1252262</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
