During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3909-1 | zabbix security update |
EUVD |
EUVD-2022-28223 | During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level |
Fixes
Solution
To remediate this vulnerability, apply the updates.
Workaround
No workaround given by the vendor.
References
History
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2025-11-03T21:45:50.064Z
Reserved: 2022-01-11T00:00:00.000Z
Link: CVE-2022-23132
No data.
Status : Modified
Published: 2022-01-13T16:15:08.113
Modified: 2025-11-03T22:15:55.673
Link: CVE-2022-23132
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD