[RHSA-2022:8250] grafana-pcp security update
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/grafana-pcp?arch=x86_64&distro=redhat-9 | < 3.2.0-3.el9 |
pkg:rpm/redhat/grafana-pcp?arch=s390x&distro=redhat-9 | < 3.2.0-3.el9 |
pkg:rpm/redhat/grafana-pcp?arch=ppc64le&distro=redhat-9 | < 3.2.0-3.el9 |
pkg:rpm/redhat/grafana-pcp?arch=aarch64&distro=redhat-9 | < 3.2.0-3.el9 |
- ID
- RHSA-2022:8250
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2022:8250
- Published
-
2022-11-15T00:00:00
(22 months ago) - Modified
-
2022-11-15T00:00:00
(22 months ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1635
- ALAS2-2022-1846
- ALAS2-2022-1847
- ALAS2-2022-1858
- ALAS2-2022-1859
- ALAS2-2022-1860
- ALAS2-2022-1861
- ALAS2-2022-1862
- ALAS2-2022-1863
- ALAS2-2022-1864
- ALAS2-2022-1865
- ALPINE:CVE-2022-1705
- ALPINE:CVE-2022-30630
- ALPINE:CVE-2022-30631
- ALPINE:CVE-2022-30632
- ALPINE:CVE-2022-30635
- ALPINE:CVE-2022-32148
- ALSA-2022:5775
- ALSA-2022:5799
- ALSA-2022:7129
- ALSA-2022:7519
- ALSA-2022:7529
- ALSA-2022:7648
- ALSA-2022:8057
- ALSA-2022:8098
- ALSA-2022:8250
- ALSA-2023:2357
- ALSA-2023:2758
- ALSA-2023:2802
- ALSA-2024:2180
- ELSA-2022-23681
- ELSA-2022-24267
- ELSA-2022-5775
- ELSA-2022-5799
- ELSA-2022-7129
- ELSA-2022-7519
- ELSA-2022-7529
- ELSA-2022-7648
- ELSA-2022-8057
- ELSA-2022-8250
- ELSA-2023-2357
- ELSA-2023-2758
- ELSA-2023-2802
- ELSA-2024-2180
- FEDORA-2022-30c5ed5625
- FREEBSD:A4F2416C-02A0-11ED-B817-10C37B4AC2EA
- GLSA-202208-02
- GO-2022-0520
- GO-2022-0522
- GO-2022-0524
- GO-2022-0525
- GO-2022-0526
- GO-2022-0527
- MS:CVE-2022-1705
- MS:CVE-2022-30630
- MS:CVE-2022-30631
- MS:CVE-2022-30632
- MS:CVE-2022-30635
- MS:CVE-2022-32148
- RHSA-2022:5775
- RHSA-2022:5799
- RHSA-2022:7129
- RHSA-2022:7519
- RHSA-2022:7529
- RHSA-2022:7648
- RHSA-2022:8057
- RHSA-2022:8098
- RHSA-2023:2357
- RHSA-2023:2758
- RHSA-2023:2802
- RHSA-2024:2180
- RLSA-2022:5775
- RLSA-2022:7129
- RLSA-2022:7519
- RLSA-2022:7529
- RLSA-2022:7648
- RLSA-2022:8057
- RLSA-2022:8098
- RLSA-2022:8250
- SUSE-SU-2022:2671-1
- SUSE-SU-2022:2672-1
- SUSE-SU-2023:2312-1
- USN-6038-1
- USN-6038-2
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2107342 | https://bugzilla.redhat.com/2107342 | |
Bugzilla | 2107371 | https://bugzilla.redhat.com/2107371 | |
Bugzilla | 2107374 | https://bugzilla.redhat.com/2107374 | |
Bugzilla | 2107383 | https://bugzilla.redhat.com/2107383 | |
Bugzilla | 2107386 | https://bugzilla.redhat.com/2107386 | |
Bugzilla | 2107388 | https://bugzilla.redhat.com/2107388 | |
RHSA | RHSA-2022:8250 | https://access.redhat.com/errata/RHSA-2022:8250 | |
CVE | CVE-2022-1705 | https://access.redhat.com/security/cve/CVE-2022-1705 | |
CVE | CVE-2022-30630 | https://access.redhat.com/security/cve/CVE-2022-30630 | |
CVE | CVE-2022-30631 | https://access.redhat.com/security/cve/CVE-2022-30631 | |
CVE | CVE-2022-30632 | https://access.redhat.com/security/cve/CVE-2022-30632 | |
CVE | CVE-2022-30635 | https://access.redhat.com/security/cve/CVE-2022-30635 | |
CVE | CVE-2022-32148 | https://access.redhat.com/security/cve/CVE-2022-32148 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/grafana-pcp?arch=x86_64&distro=redhat-9 | redhat | grafana-pcp | < 3.2.0-3.el9 | redhat-9 | x86_64 | |
Affected | pkg:rpm/redhat/grafana-pcp?arch=s390x&distro=redhat-9 | redhat | grafana-pcp | < 3.2.0-3.el9 | redhat-9 | s390x | |
Affected | pkg:rpm/redhat/grafana-pcp?arch=ppc64le&distro=redhat-9 | redhat | grafana-pcp | < 3.2.0-3.el9 | redhat-9 | ppc64le | |
Affected | pkg:rpm/redhat/grafana-pcp?arch=aarch64&distro=redhat-9 | redhat | grafana-pcp | < 3.2.0-3.el9 | redhat-9 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |