[SUSE-SU-2022:3765-1] Security update for grafana

Severity Important
Affected Packages 8
CVEs 5

Security update for grafana

This update for grafana fixes the following issues:

Updated to version 8.3.10 (jsc#SLE-24565, jsc#SLE-23422, jsc#SLE-23439):

  • CVE-2022-31097: Fixed XSS vulnerability in the Unified Alerting (bsc#1201535).
  • CVE-2022-31107: Fixed OAuth account takeover vulnerability (bsc#1201539).
  • CVE-2022-21702: Fixed XSS through attacker-controlled data source (bsc#1195726).
  • CVE-2022-21703: Fixed Cross Site Request Forgery (bsc#1195727).
  • CVE-2022-21713: Fixed Teams API IDOR (bsc#1195728).
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/grafana?arch=x86_64&distro=opensuse-leap-15.4 suse grafana < 8.3.10-150200.3.26.1 opensuse-leap-15.4 x86_64
Affected pkg:rpm/suse/grafana?arch=x86_64&distro=opensuse-leap-15.3 suse grafana < 8.3.10-150200.3.26.1 opensuse-leap-15.3 x86_64
Affected pkg:rpm/suse/grafana?arch=s390x&distro=opensuse-leap-15.4 suse grafana < 8.3.10-150200.3.26.1 opensuse-leap-15.4 s390x
Affected pkg:rpm/suse/grafana?arch=s390x&distro=opensuse-leap-15.3 suse grafana < 8.3.10-150200.3.26.1 opensuse-leap-15.3 s390x
Affected pkg:rpm/suse/grafana?arch=ppc64le&distro=opensuse-leap-15.4 suse grafana < 8.3.10-150200.3.26.1 opensuse-leap-15.4 ppc64le
Affected pkg:rpm/suse/grafana?arch=ppc64le&distro=opensuse-leap-15.3 suse grafana < 8.3.10-150200.3.26.1 opensuse-leap-15.3 ppc64le
Affected pkg:rpm/suse/grafana?arch=aarch64&distro=opensuse-leap-15.4 suse grafana < 8.3.10-150200.3.26.1 opensuse-leap-15.4 aarch64
Affected pkg:rpm/suse/grafana?arch=aarch64&distro=opensuse-leap-15.3 suse grafana < 8.3.10-150200.3.26.1 opensuse-leap-15.3 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...