mirror of
git://git.openembedded.org/meta-openembedded
synced 2026-04-02 02:49:12 +00:00
CVE-2026-23919: Has been fixed since version 7.0.19[1], mark it as patched
CVE-2026-23920: Has been fixed since version 7.0.22[2], mark it as patched
CVE-2026-23921: Has been fixed since version 7.0.22[3], mark it as patched
CVE-2026-23923: The vulnerable code isn't present in 7.0 yet, it is specific
to 7.4 versions. Compare the fix[4] in 7.4, which is changes code that doesn't
exist in the recipe version. Ignore this CVE due to this.
[1]: https://support.zabbix.com/browse/ZBX-27638
[2]: https://support.zabbix.com/browse/ZBX-27639
[3]: https://support.zabbix.com/browse/ZBX-27640
[4]: 043c28c208
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
85 lines
3.2 KiB
BlitzBasic
85 lines
3.2 KiB
BlitzBasic
SUMMARY = "Open-source monitoring solution for your IT infrastructure"
|
|
DESCRIPTION = "\
|
|
ZABBIX is software that monitors numerous parameters of a network and the \
|
|
health and integrity of servers. ZABBIX uses a flexible notification \
|
|
mechanism that allows users to configure e-mail based alerts for virtually \
|
|
any event. This allows a fast reaction to server problems. ZABBIX offers \
|
|
excellent reporting and data visualisation features based on the stored \
|
|
data. This makes ZABBIX ideal for capacity planning. \
|
|
\
|
|
ZABBIX supports both polling and trapping. All ZABBIX reports and \
|
|
statistics, as well as configuration parameters are accessed through a \
|
|
web-based front end. A web-based front end ensures that the status of \
|
|
your network and the health of your servers can be assessed from any \
|
|
location. Properly configured, ZABBIX can play an important role in \
|
|
monitoring IT infrastructure. This is equally true for small \
|
|
organisations with a few servers and for large companies with a \
|
|
multitude of servers."
|
|
HOMEPAGE = "http://www.zabbix.com/"
|
|
SECTION = "Applications/Internet"
|
|
LICENSE = "AGPL-3.0-only"
|
|
LIC_FILES_CHKSUM = "file://COPYING;md5=eb1e647870add0502f8f010b19de32af"
|
|
DEPENDS = "libevent libpcre openldap virtual/libiconv zlib"
|
|
|
|
PACKAGE_ARCH = "${MACHINE_ARCH}"
|
|
|
|
SRC_URI = "https://cdn.zabbix.com/zabbix/sources/stable/7.0/${BPN}-${PV}.tar.gz \
|
|
file://0001-Fix-configure.ac.patch \
|
|
file://zabbix-agent.service \
|
|
"
|
|
SRC_URI[sha256sum] = "6f8ae990b9b25767e4fffbcb5cc7c455d674e2a392dc21478488a5d1c0e7d597"
|
|
|
|
inherit autotools-brokensep linux-kernel-base pkgconfig systemd useradd
|
|
|
|
SYSTEMD_PACKAGES = "${PN}"
|
|
SYSTEMD_SERVICE:${PN} = "zabbix-agent.service"
|
|
SYSTEMD_AUTO_ENABLE = "enable"
|
|
|
|
USERADD_PACKAGES = "${PN}"
|
|
GROUPADD_PARAM:${PN} = "-r zabbix"
|
|
USERADD_PARAM:${PN} = "-r -g zabbix -d /var/lib/zabbix \
|
|
-s /sbin/nologin -c \"Zabbix Monitoring System\" zabbix \
|
|
"
|
|
|
|
KERNEL_VERSION = "${@get_kernelversion_headers('${STAGING_KERNEL_DIR}')}"
|
|
|
|
EXTRA_OECONF = " \
|
|
--enable-dependency-tracking \
|
|
--enable-agent \
|
|
--enable-ipv6 \
|
|
--with-net-snmp \
|
|
--with-ldap=${STAGING_EXECPREFIXDIR} \
|
|
--with-unixodbc \
|
|
--with-ssh2 \
|
|
--with-sqlite3 \
|
|
--with-zlib \
|
|
--with-libpthread \
|
|
--with-libevent \
|
|
--with-libpcre=${STAGING_EXECPREFIXDIR} \
|
|
--with-libpcre-lib=${STAGING_LIBDIR} \
|
|
--with-iconv=${STAGING_EXECPREFIXDIR} \
|
|
"
|
|
CFLAGS:append = " -lldap -llber -pthread"
|
|
|
|
do_configure:prepend() {
|
|
export KERNEL_VERSION="${KERNEL_VERSION}"
|
|
}
|
|
|
|
do_install:append() {
|
|
if ${@bb.utils.contains('DISTRO_FEATURES','systemd','true','false',d)}; then
|
|
install -d ${D}${systemd_unitdir}/system
|
|
install -m 0644 ${UNPACKDIR}/zabbix-agent.service ${D}${systemd_unitdir}/system/
|
|
sed -i -e 's#@SBINDIR@#${sbindir}#g' ${D}${systemd_unitdir}/system/zabbix-agent.service
|
|
fi
|
|
}
|
|
|
|
FILES:${PN} += "${libdir}"
|
|
|
|
RDEPENDS:${PN} = "logrotate"
|
|
|
|
CVE_STATUS[CVE-2026-23925] = "fixed-version: fixed since 7.0.18"
|
|
CVE_STATUS[CVE-2026-23919] = "fixed-version: fixed since 7.0.19"
|
|
CVE_STATUS[CVE-2026-23920] = "fixed-version: fixed since 7.0.22"
|
|
CVE_STATUS[CVE-2026-23921] = "fixed-version: fixed since 7.0.22"
|
|
CVE_STATUS[CVE-2026-23923] = "cpe-incorrect: 7.0 versions don't have the vulnerable code"
|