During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3909-1 zabbix security update
EUVD EUVD EUVD-2022-28223 During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level
Fixes

Solution

To remediate this vulnerability, apply the updates.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2024-09-16T20:37:11.038Z

Reserved: 2022-01-11T00:00:00

Link: CVE-2022-23132

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-13T16:15:08.113

Modified: 2024-11-21T06:48:04.023

Link: CVE-2022-23132

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.