During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3909-1 zabbix security update
EUVD EUVD EUVD-2022-28223 During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level
Fixes

Solution

To remediate this vulnerability, apply the updates.


Workaround

No workaround given by the vendor.

History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2025-11-03T21:45:50.064Z

Reserved: 2022-01-11T00:00:00.000Z

Link: CVE-2022-23132

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-13T16:15:08.113

Modified: 2025-11-03T22:15:55.673

Link: CVE-2022-23132

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses