Thursday, April 25, 2024

[USN-6751-1] Zabbix vulnerabilities

-----BEGIN PGP SIGNATURE-----
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=B0nz
-----END PGP SIGNATURE-----

==========================================================================

Ubuntu Security Notice USN-6751-1

April 25, 2024

zabbix vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS (Available with Ubuntu Pro)
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Zabbix could allow reflected cross-site scripting (XSS) attacks.

Software Description:
- zabbix: Open-source monitoring software tool for diverse IT components

Details:

It was discovered that Zabbix incorrectly handled input data in the
discovery and graphs pages. A remote authenticated attacker could possibly
use this issue to perform reflected cross-site scripting (XSS) attacks.
(CVE-2022-35229, CVE-2022-35230)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS (Available with Ubuntu Pro):
  zabbix-agent                    1:4.0.17+dfsg-1ubuntu0.1~esm1
  zabbix-frontend-php             1:4.0.17+dfsg-1ubuntu0.1~esm1
  zabbix-java-gateway             1:4.0.17+dfsg-1ubuntu0.1~esm1
  zabbix-proxy-mysql              1:4.0.17+dfsg-1ubuntu0.1~esm1
  zabbix-proxy-pgsql              1:4.0.17+dfsg-1ubuntu0.1~esm1
  zabbix-proxy-sqlite3            1:4.0.17+dfsg-1ubuntu0.1~esm1
  zabbix-server-mysql             1:4.0.17+dfsg-1ubuntu0.1~esm1
  zabbix-server-pgsql             1:4.0.17+dfsg-1ubuntu0.1~esm1

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  zabbix-agent                    1:3.0.12+dfsg-1ubuntu0.1~esm3
  zabbix-frontend-php             1:3.0.12+dfsg-1ubuntu0.1~esm3
  zabbix-java-gateway             1:3.0.12+dfsg-1ubuntu0.1~esm3
  zabbix-proxy-mysql              1:3.0.12+dfsg-1ubuntu0.1~esm3
  zabbix-proxy-pgsql              1:3.0.12+dfsg-1ubuntu0.1~esm3
  zabbix-proxy-sqlite3            1:3.0.12+dfsg-1ubuntu0.1~esm3
  zabbix-server-mysql             1:3.0.12+dfsg-1ubuntu0.1~esm3
  zabbix-server-pgsql             1:3.0.12+dfsg-1ubuntu0.1~esm3

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  zabbix-agent                    1:2.4.7+dfsg-2ubuntu2.1+esm3
  zabbix-frontend-php             1:2.4.7+dfsg-2ubuntu2.1+esm3
  zabbix-java-gateway             1:2.4.7+dfsg-2ubuntu2.1+esm3
  zabbix-proxy-mysql              1:2.4.7+dfsg-2ubuntu2.1+esm3
  zabbix-proxy-pgsql              1:2.4.7+dfsg-2ubuntu2.1+esm3
  zabbix-proxy-sqlite3            1:2.4.7+dfsg-2ubuntu2.1+esm3
  zabbix-server-mysql             1:2.4.7+dfsg-2ubuntu2.1+esm3
  zabbix-server-pgsql             1:2.4.7+dfsg-2ubuntu2.1+esm3

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
  zabbix-agent                    1:2.2.2+dfsg-1ubuntu1+esm5
  zabbix-frontend-php             1:2.2.2+dfsg-1ubuntu1+esm5
  zabbix-java-gateway             1:2.2.2+dfsg-1ubuntu1+esm5
  zabbix-proxy-mysql              1:2.2.2+dfsg-1ubuntu1+esm5
  zabbix-proxy-pgsql              1:2.2.2+dfsg-1ubuntu1+esm5
  zabbix-proxy-sqlite3            1:2.2.2+dfsg-1ubuntu1+esm5
  zabbix-server-mysql             1:2.2.2+dfsg-1ubuntu1+esm5
  zabbix-server-pgsql             1:2.2.2+dfsg-1ubuntu1+esm5

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6751-1
  CVE-2022-35229, CVE-2022-35230

No comments:

Post a Comment