During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3909-1 | zabbix security update |
EUVD |
EUVD-2022-28223 | During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level |
Fixes
Solution
To remediate this vulnerability, apply the updates.
Workaround
No workaround given by the vendor.
References
History
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2025-11-03T21:45:50.064Z
Reserved: 2022-01-11T00:00:00.000Z
Link: CVE-2022-23132
No data.
Status : Modified
Published: 2022-01-13T16:15:08.113
Modified: 2025-11-03T22:15:55.673
Link: CVE-2022-23132
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD