wsD5BAABCAAjFiEE26yozGlLvY8PLmS9C+du+fOjiEwFAmYqoUYFAwAAAAAACgkQC+du+fOjiExm
ugv9FIOPm6NpfSYGYm2PTfeArIWyB6S6YINleXYO7knqlUU2IWcHUHHu+riGrBr7BTSfxEL8sgim
gWEL97wxgVuPbS6bcdmqGZlitP+jMaJELdL3AgqzNEQVRgyWX7yCuJCg29eRh4JIUt2KAslic+uq
h56XgE92kChJIqms6H+hiXH4uZb0qj8ugema3FarTgeSA5sQ7avSbSH3q18ac3GObQpLI4aNySxK
yevJOrhRbr7uDP4OM8/Hrq8LV7h/StJR/hxaAx/TY/wxDVoPn39Hgh63KMj3UPcHNV/zSm/T3QHM
iO4Z2vF5ShkJ6wixdtcsjXGZkamicmSkcZwKOCCJcCNwAr8+BKR4Dd9bT4IueKsUUvQUsWkSf//K
/bHzXOBbB2shHAz5GbfKcE1231Ze0pdkisDwS/MW+T2bJ6TC6G5Dxhtml+pc+4wfpv8nbLTGrlJ6
cRENJQ81EogiS0vIimH9n3AqGHVcPMfy8cAH88MyyIdpLmVNGsUyZ8mw04EE
=B0nz
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6751-1
April 25, 2024
zabbix vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS (Available with Ubuntu Pro)
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)
Summary:
Zabbix could allow reflected cross-site scripting (XSS) attacks.
Software Description:
- zabbix: Open-source monitoring software tool for diverse IT components
Details:
It was discovered that Zabbix incorrectly handled input data in the
discovery and graphs pages. A remote authenticated attacker could possibly
use this issue to perform reflected cross-site scripting (XSS) attacks.
(CVE-2022-35229, CVE-2022-35230)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS (Available with Ubuntu Pro):
zabbix-agent 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-frontend-php 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-java-gateway 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-proxy-mysql 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-proxy-pgsql 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-proxy-sqlite3 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-server-mysql 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-server-pgsql 1:4.0.17+dfsg-1ubuntu0.1~esm1
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
zabbix-agent 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-frontend-php 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-java-gateway 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-proxy-mysql 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-proxy-pgsql 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-proxy-sqlite3 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-server-mysql 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-server-pgsql 1:3.0.12+dfsg-1ubuntu0.1~esm3
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
zabbix-agent 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-frontend-php 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-java-gateway 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-proxy-mysql 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-proxy-pgsql 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-proxy-sqlite3 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-server-mysql 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-server-pgsql 1:2.4.7+dfsg-2ubuntu2.1+esm3
Ubuntu 14.04 LTS (Available with Ubuntu Pro):
zabbix-agent 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-frontend-php 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-java-gateway 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-proxy-mysql 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-proxy-pgsql 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-proxy-sqlite3 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-server-mysql 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-server-pgsql 1:2.2.2+dfsg-1ubuntu1+esm5
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6751-1
CVE-2022-35229, CVE-2022-35230
zabbix vulnerabilities
==============================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS (Available with Ubuntu Pro)
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)
Summary:
Zabbix could allow reflected cross-site scripting (XSS) attacks.
Software Description:
- zabbix: Open-source monitoring software tool for diverse IT components
Details:
It was discovered that Zabbix incorrectly handled input data in the
discovery and graphs pages. A remote authenticated attacker could possibly
use this issue to perform reflected cross-site scripting (XSS) attacks.
(CVE-2022-35229, CVE-2022-35230)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS (Available with Ubuntu Pro):
zabbix-agent 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-frontend-php 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-java-gateway 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-proxy-mysql 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-proxy-pgsql 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-proxy-sqlite3 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-server-mysql 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-server-pgsql 1:4.0.17+dfsg-1ubuntu0.1~esm1
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
zabbix-agent 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-frontend-php 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-java-gateway 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-proxy-mysql 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-proxy-pgsql 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-proxy-sqlite3 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-server-mysql 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-server-pgsql 1:3.0.12+dfsg-1ubuntu0.1~esm3
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
zabbix-agent 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-frontend-php 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-java-gateway 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-proxy-mysql 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-proxy-pgsql 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-proxy-sqlite3 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-server-mysql 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-server-pgsql 1:2.4.7+dfsg-2ubuntu2.1+esm3
Ubuntu 14.04 LTS (Available with Ubuntu Pro):
zabbix-agent 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-frontend-php 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-java-gateway 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-proxy-mysql 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-proxy-pgsql 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-proxy-sqlite3 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-server-mysql 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-server-pgsql 1:2.2.2+dfsg-1ubuntu1+esm5
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/no
CVE-2022-35229, CVE-2022-35230
No comments:
Post a Comment