During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3909-1 | zabbix security update |
EUVD |
EUVD-2022-28223 | During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level |
Fixes
Solution
To remediate this vulnerability, apply the updates.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2024-09-16T20:37:11.038Z
Reserved: 2022-01-11T00:00:00
Link: CVE-2022-23132
No data.
Status : Modified
Published: 2022-01-13T16:15:08.113
Modified: 2024-11-21T06:48:04.023
Link: CVE-2022-23132
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD