[RHSA-2023:2784] grafana security update
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)
grafana: using email as a username can block other users from signing in (CVE-2022-39229)
golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/grafana?arch=x86_64&distro=redhat-8 | < 7.5.15-4.el8 |
pkg:rpm/redhat/grafana?arch=s390x&distro=redhat-8 | < 7.5.15-4.el8 |
pkg:rpm/redhat/grafana?arch=ppc64le&distro=redhat-8 | < 7.5.15-4.el8 |
pkg:rpm/redhat/grafana?arch=aarch64&distro=redhat-8 | < 7.5.15-4.el8 |
- ID
- RHSA-2023:2784
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2023:2784
- Published
-
2023-05-16T00:00:00
(16 months ago) - Modified
-
2023-05-16T00:00:00
(16 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1635
- ALAS-2023-1825
- ALAS2-2022-1851
- ALAS2-2022-1858
- ALAS2-2022-1859
- ALAS2-2022-1860
- ALAS2-2022-1861
- ALAS2-2022-1862
- ALAS2-2022-1863
- ALAS2-2022-1864
- ALAS2-2022-1865
- ALAS2-2022-1887
- ALAS2-2023-1913
- ALAS2-2023-2015
- ALAS2-2023-2238
- ALPINE:CVE-2022-27664
- ALPINE:CVE-2022-2880
- ALPINE:CVE-2022-41715
- ALSA-2022:7129
- ALSA-2023:0328
- ALSA-2023:0446
- ALSA-2023:2167
- ALSA-2023:2177
- ALSA-2023:2193
- ALSA-2023:2204
- ALSA-2023:2236
- ALSA-2023:2357
- ALSA-2023:2758
- ALSA-2023:2780
- ALSA-2023:2784
- ALSA-2023:2785
- ALSA-2023:2802
- ALSA-2023:2866
- ALSA-2024:0121
- ALSA-2024:3254
- ELSA-2022-24267
- ELSA-2022-7129
- ELSA-2023-0328
- ELSA-2023-0446
- ELSA-2023-18908
- ELSA-2023-2167
- ELSA-2023-2177
- ELSA-2023-2204
- ELSA-2023-2357
- ELSA-2023-2592
- ELSA-2023-2758
- ELSA-2023-2780
- ELSA-2023-2784
- ELSA-2023-2785
- ELSA-2023-2802
- ELSA-2023-2866
- ELSA-2024-0121
- ELSA-2024-2988
- ELSA-2024-3254
- FEDORA-2022-0e313cc582
- FEDORA-2022-45097317b4
- FEDORA-2022-59a20edab2
- FEDORA-2022-67ec8c61d0
- FREEBSD:6FEA7103-2EA4-11ED-B403-3DAE8AC60D3E
- FREEBSD:854C2AFB-4424-11ED-AF97-ADCABF310F9B
- FREEBSD:909A80BA-6294-11ED-9CA2-6C3BE5272ACD
- GLSA-202209-26
- GLSA-202311-09
- GO-2022-0969
- GO-2022-1038
- GO-2022-1039
- GO-2024-2848
- MS:CVE-2022-27664
- RHSA-2022:7129
- RHSA-2023:0328
- RHSA-2023:0446
- RHSA-2023:2167
- RHSA-2023:2177
- RHSA-2023:2193
- RHSA-2023:2204
- RHSA-2023:2236
- RHSA-2023:2357
- RHSA-2023:2592
- RHSA-2023:2758
- RHSA-2023:2780
- RHSA-2023:2785
- RHSA-2023:2802
- RHSA-2023:2866
- RHSA-2024:0121
- RHSA-2024:2988
- RHSA-2024:3254
- RLSA-2022:7129
- RLSA-2023:0328
- RLSA-2023:0446
- SUSE-SU-2022:3325-1
- SUSE-SU-2022:3326-1
- SUSE-SU-2022:3668-1
- SUSE-SU-2022:3669-1
- SUSE-SU-2023:0352-1
- SUSE-SU-2023:0353-1
- SUSE-SU-2023:0362-1
- SUSE-SU-2023:2182-1
- SUSE-SU-2023:2183-1
- SUSE-SU-2023:2185-1
- SUSE-SU-2023:2187-1
- SUSE-SU-2023:2312-1
- SUSE-SU-2023:2575-1
- SUSE-SU-2023:2578-1
- SUSE-SU-2023:2579-1
- SUSE-SU-2023:2598-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- SUSE-SU-2024:0486-1
- SUSE-SU-2024:0487-1
- USN-6038-1
- USN-6038-2
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2124669 | https://bugzilla.redhat.com/2124669 | |
Bugzilla | 2131149 | https://bugzilla.redhat.com/2131149 | |
Bugzilla | 2132868 | https://bugzilla.redhat.com/2132868 | |
Bugzilla | 2132872 | https://bugzilla.redhat.com/2132872 | |
RHSA | RHSA-2023:2784 | https://access.redhat.com/errata/RHSA-2023:2784 | |
CVE | CVE-2022-27664 | https://access.redhat.com/security/cve/CVE-2022-27664 | |
CVE | CVE-2022-2880 | https://access.redhat.com/security/cve/CVE-2022-2880 | |
CVE | CVE-2022-39229 | https://access.redhat.com/security/cve/CVE-2022-39229 | |
CVE | CVE-2022-41715 | https://access.redhat.com/security/cve/CVE-2022-41715 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/grafana?arch=x86_64&distro=redhat-8 | redhat | grafana | < 7.5.15-4.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/grafana?arch=s390x&distro=redhat-8 | redhat | grafana | < 7.5.15-4.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/grafana?arch=ppc64le&distro=redhat-8 | redhat | grafana | < 7.5.15-4.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/grafana?arch=aarch64&distro=redhat-8 | redhat | grafana | < 7.5.15-4.el8 | redhat-8 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |