[RHSA-2023:6420] grafana security and enhancement update
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
grafana: persistent xss in grafana core plugins (CVE-2022-23552)
grafana: plugin signature bypass (CVE-2022-31123)
grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins (CVE-2022-31130)
grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins (CVE-2022-39201)
grafana: email addresses and usernames cannot be trusted (CVE-2022-39306)
grafana: User enumeration via forget password (CVE-2022-39307)
grafana: Spoofing of the originalUrl parameter of snapshots (CVE-2022-39324)
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)
golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/grafana?arch=x86_64&distro=redhat-9.3 | < 9.2.10-7.el9_3 |
pkg:rpm/redhat/grafana?arch=s390x&distro=redhat-9.3 | < 9.2.10-7.el9_3 |
pkg:rpm/redhat/grafana?arch=ppc64le&distro=redhat-9.3 | < 9.2.10-7.el9_3 |
pkg:rpm/redhat/grafana?arch=aarch64&distro=redhat-9.3 | < 9.2.10-7.el9_3 |
- ID
- RHSA-2023:6420
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2023:6420
- Published
-
2023-11-07T00:00:00
(10 months ago) - Modified
-
2023-11-07T00:00:00
(10 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1731
- ALAS-2023-1848
- ALAS2-2023-1926
- ALAS2-2023-2015
- ALAS2-2023-2037
- ALPINE:CVE-2022-41717
- ALPINE:CVE-2023-24534
- ALSA-2023:2204
- ALSA-2023:2222
- ALSA-2023:2236
- ALSA-2023:2253
- ALSA-2023:2282
- ALSA-2023:2283
- ALSA-2023:2357
- ALSA-2023:2367
- ALSA-2023:2758
- ALSA-2023:2780
- ALSA-2023:2802
- ALSA-2023:2866
- ALSA-2023:6346
- ALSA-2023:6363
- ALSA-2023:6402
- ALSA-2023:6420
- ALSA-2023:6473
- ALSA-2023:6474
- ALSA-2023:6938
- ALSA-2023:6939
- ELSA-2023-18908
- ELSA-2023-2204
- ELSA-2023-2222
- ELSA-2023-2253
- ELSA-2023-2282
- ELSA-2023-2283
- ELSA-2023-2357
- ELSA-2023-2367
- ELSA-2023-2758
- ELSA-2023-2780
- ELSA-2023-2802
- ELSA-2023-2866
- ELSA-2023-6363
- ELSA-2023-6402
- ELSA-2023-6420
- ELSA-2023-6473
- ELSA-2023-6474
- ELSA-2023-6938
- ELSA-2023-6939
- FEDORA-2023-0c354a3f9a
- FEDORA-2023-0fa7715821
- FEDORA-2023-0fff8bc164
- FEDORA-2023-2663dc67d8
- FEDORA-2023-267503a090
- FEDORA-2023-2df9d60e4c
- FEDORA-2023-322314ad50
- FEDORA-2023-327346caa5
- FEDORA-2023-3baf3f43a0
- FEDORA-2023-3dba09f630
- FEDORA-2023-4e2068ba5d
- FEDORA-2023-5eca6a8326
- FEDORA-2023-62ce942e75
- FEDORA-2023-6550d9323b
- FEDORA-2023-6cfe7492c1
- FEDORA-2023-6d71ff268e
- FEDORA-2023-70eb8ba61e
- FEDORA-2023-74e5545901
- FEDORA-2023-8b700042ac
- FEDORA-2023-8c02aee138
- FEDORA-2023-8ecc0e487e
- FEDORA-2023-946dfaf17f
- FEDORA-2023-a5a5542890
- FEDORA-2023-aa7c75ed4a
- FEDORA-2023-abb47e24d8
- FEDORA-2023-ac4651c9b2
- FEDORA-2023-af2e3d1c18
- FEDORA-2023-c0149844e2
- FEDORA-2023-c9b2182a4e
- FEDORA-2023-ca444fdecf
- FEDORA-2023-cb3a59a3df
- FEDORA-2023-ce2836acfa
- FEDORA-2023-e16469fdec
- FEDORA-2023-e359fd31d2
- FEDORA-2023-e82fd2abcb
- FEDORA-2023-e8c27ba884
- FEDORA-2023-ee472c698c
- FEDORA-2023-f4bd7ab2f7
- FEDORA-2024-ae653fb07b
- FEDORA-2024-b85b97c0e9
- FEDORA-2024-fb32950d11
- FEDORA-2024-fd3545a844
- FREEBSD:02E51CB3-D7E4-11ED-9F7A-5404A68AD561
- FREEBSD:0A80F159-629B-11ED-9CA2-6C3BE5272ACD
- FREEBSD:348EE234-D541-11ED-AD86-A134A566F1E6
- FREEBSD:4E60D660-6298-11ED-9CA2-6C3BE5272ACD
- FREEBSD:6877E164-6296-11ED-9CA2-6C3BE5272ACD
- FREEBSD:6EB6A442-629A-11ED-9CA2-6C3BE5272ACD
- FREEBSD:6F5192F5-75A7-11ED-83C0-411D43CE7FE4
- FREEBSD:6F6C9420-6297-11ED-9CA2-6C3BE5272ACD
- FREEBSD:E6281D88-A7A7-11ED-8D6A-6C3BE5272ACD
- FREEBSD:ECFFB881-A7A7-11ED-8D6A-6C3BE5272ACD
- GLSA-202311-09
- GO-2022-1144
- GO-2023-1704
- GO-2024-2843
- GO-2024-2844
- GO-2024-2851
- GO-2024-2855
- GO-2024-2858
- GO-2024-2867
- MS:CVE-2022-41717
- RHSA-2023:0328
- RHSA-2023:0446
- RHSA-2023:2204
- RHSA-2023:2222
- RHSA-2023:2236
- RHSA-2023:2253
- RHSA-2023:2282
- RHSA-2023:2283
- RHSA-2023:2357
- RHSA-2023:2367
- RHSA-2023:2758
- RHSA-2023:2780
- RHSA-2023:2802
- RHSA-2023:2866
- RHSA-2023:3318
- RHSA-2023:3319
- RHSA-2023:6346
- RHSA-2023:6363
- RHSA-2023:6402
- RHSA-2023:6473
- RHSA-2023:6474
- RHSA-2023:6938
- RHSA-2023:6939
- SUSE-SU-2022:4397-1
- SUSE-SU-2022:4398-1
- SUSE-SU-2023:0352-1
- SUSE-SU-2023:0353-1
- SUSE-SU-2023:0362-1
- SUSE-SU-2023:0811-1
- SUSE-SU-2023:0812-1
- SUSE-SU-2023:0821-1
- SUSE-SU-2023:1791-1
- SUSE-SU-2023:1792-1
- SUSE-SU-2023:2105-1
- SUSE-SU-2023:2105-2
- SUSE-SU-2023:2127-1
- SUSE-SU-2023:2312-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- USN-6038-1
- USN-6038-2
- USN-6140-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/grafana?arch=x86_64&distro=redhat-9.3 | redhat | grafana | < 9.2.10-7.el9_3 | redhat-9.3 | x86_64 | |
Affected | pkg:rpm/redhat/grafana?arch=s390x&distro=redhat-9.3 | redhat | grafana | < 9.2.10-7.el9_3 | redhat-9.3 | s390x | |
Affected | pkg:rpm/redhat/grafana?arch=ppc64le&distro=redhat-9.3 | redhat | grafana | < 9.2.10-7.el9_3 | redhat-9.3 | ppc64le | |
Affected | pkg:rpm/redhat/grafana?arch=aarch64&distro=redhat-9.3 | redhat | grafana | < 9.2.10-7.el9_3 | redhat-9.3 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |