[ALSA-2023:6420] Moderate: grafana security and enhancement update
Type:
security
Severity:
moderate
Release date:
2023-11-14
Description:
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * grafana: persistent xss in grafana core plugins (CVE-2022-23552) * grafana: plugin signature bypass (CVE-2022-31123) * grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins (CVE-2022-31130) * grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins (CVE-2022-39201) * grafana: email addresses and usernames cannot be trusted (CVE-2022-39306) * grafana: User enumeration via forget password (CVE-2022-39307) * grafana: Spoofing of the originalUrl parameter of snapshots (CVE-2022-39324) * golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717) * golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 grafana-9.2.10-7.el9_3.alma.1.aarch64.rpm 508ccc88d7eb43d159f3f78a3fc2fda1212e34f13622ead2d8f54d4208b76f15
ppc64le grafana-9.2.10-7.el9_3.alma.1.ppc64le.rpm 6e51f26de0294a0016a588df3d1f9510ecb87ce805b729f3ebd988f8d9402bbd
s390x grafana-9.2.10-7.el9_3.alma.1.s390x.rpm 5d80796062db2034a000a3b5525d8596f183e5630674668a3c55db728e405738
x86_64 grafana-9.2.10-7.el9_3.alma.1.x86_64.rpm 79ba80aefdd8291999cfeaa1d3a19e309ee162216b148ca86200ea4935c0af35
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.