- Issued:
- 2022-11-08
- Updated:
- 2022-11-08
RHSA-2022:7519 - Security Advisory
Synopsis
Moderate: grafana security, bug fix, and enhancement update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for grafana is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055348)
Security Fix(es):
- sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648)
- golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
- golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
- grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673)
- prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
- grafana: XSS vulnerability in data source handling (CVE-2022-21702)
- grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703)
- grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713)
- golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
- golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
- golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
- golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
- golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
- golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
- golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
Fixes
- BZ - 2044628 - CVE-2022-21673 grafana: Forward OAuth Identity Token can allow users to access some data sources
- BZ - 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter
- BZ - 2050648 - CVE-2022-21702 grafana: XSS vulnerability in data source handling
- BZ - 2050742 - CVE-2022-21703 grafana: CSRF vulnerability can lead to privilege escalation
- BZ - 2050743 - CVE-2022-21713 grafana: IDOR vulnerability can lead to information disclosure
- BZ - 2055348 - Rebase of Grafana in RHEL 8.7
- BZ - 2065290 - CVE-2021-23648 sanitize-url: XSS due to improper sanitization in sanitizeUrl function
- BZ - 2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read
- BZ - 2107371 - CVE-2022-30630 golang: io/fs: stack exhaustion in Glob
- BZ - 2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header
- BZ - 2107376 - CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions
- BZ - 2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
- BZ - 2107386 - CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob
- BZ - 2107388 - CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode
- BZ - 2107390 - CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip
- BZ - 2107392 - CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal
CVEs
Red Hat Enterprise Linux for x86_64 8
SRPM | |
---|---|
grafana-7.5.15-3.el8.src.rpm | SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8 |
x86_64 | |
grafana-7.5.15-3.el8.x86_64.rpm | SHA-256: 20f0a642b2f6ca8ad82ba0aedcb9edfc001dd91d71a129615b4453a204348be1 |
grafana-debuginfo-7.5.15-3.el8.x86_64.rpm | SHA-256: 434e25b5e14c344a5a5fa7bfbb6dd2fc589cfa7cfb1ce480560f28d068662133 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8
SRPM | |
---|---|
grafana-7.5.15-3.el8.src.rpm | SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8 |
x86_64 | |
grafana-7.5.15-3.el8.x86_64.rpm | SHA-256: 20f0a642b2f6ca8ad82ba0aedcb9edfc001dd91d71a129615b4453a204348be1 |
grafana-debuginfo-7.5.15-3.el8.x86_64.rpm | SHA-256: 434e25b5e14c344a5a5fa7bfbb6dd2fc589cfa7cfb1ce480560f28d068662133 |
Red Hat Enterprise Linux for IBM z Systems 8
SRPM | |
---|---|
grafana-7.5.15-3.el8.src.rpm | SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8 |
s390x | |
grafana-7.5.15-3.el8.s390x.rpm | SHA-256: 09e15a87c8a0bc3226607da8db7e4f7c7d957563ef5d145bad0bcdd2cd3f13de |
grafana-debuginfo-7.5.15-3.el8.s390x.rpm | SHA-256: 6d535e30c35699f1e4a0e2b65ffbafa4fd046a726b2e318b9405b5d3d909a396 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8
SRPM | |
---|---|
grafana-7.5.15-3.el8.src.rpm | SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8 |
s390x | |
grafana-7.5.15-3.el8.s390x.rpm | SHA-256: 09e15a87c8a0bc3226607da8db7e4f7c7d957563ef5d145bad0bcdd2cd3f13de |
grafana-debuginfo-7.5.15-3.el8.s390x.rpm | SHA-256: 6d535e30c35699f1e4a0e2b65ffbafa4fd046a726b2e318b9405b5d3d909a396 |
Red Hat Enterprise Linux for Power, little endian 8
SRPM | |
---|---|
grafana-7.5.15-3.el8.src.rpm | SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8 |
ppc64le | |
grafana-7.5.15-3.el8.ppc64le.rpm | SHA-256: e86be2c5f61014baf2fc8a5999ecce8619e57d99dc3602efb3387878c57e93e3 |
grafana-debuginfo-7.5.15-3.el8.ppc64le.rpm | SHA-256: ab01b45d53d885101059d2c9c72d4782ea0ba4cea9ac3d6b76f0227bf72e1b9c |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8
SRPM | |
---|---|
grafana-7.5.15-3.el8.src.rpm | SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8 |
ppc64le | |
grafana-7.5.15-3.el8.ppc64le.rpm | SHA-256: e86be2c5f61014baf2fc8a5999ecce8619e57d99dc3602efb3387878c57e93e3 |
grafana-debuginfo-7.5.15-3.el8.ppc64le.rpm | SHA-256: ab01b45d53d885101059d2c9c72d4782ea0ba4cea9ac3d6b76f0227bf72e1b9c |
Red Hat Enterprise Linux Server - TUS 8.8
SRPM | |
---|---|
grafana-7.5.15-3.el8.src.rpm | SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8 |
x86_64 | |
grafana-7.5.15-3.el8.x86_64.rpm | SHA-256: 20f0a642b2f6ca8ad82ba0aedcb9edfc001dd91d71a129615b4453a204348be1 |
grafana-debuginfo-7.5.15-3.el8.x86_64.rpm | SHA-256: 434e25b5e14c344a5a5fa7bfbb6dd2fc589cfa7cfb1ce480560f28d068662133 |
Red Hat Enterprise Linux for ARM 64 8
SRPM | |
---|---|
grafana-7.5.15-3.el8.src.rpm | SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8 |
aarch64 | |
grafana-7.5.15-3.el8.aarch64.rpm | SHA-256: b36ad4804efc28af2ccc81e24a48fc0edeedaed50edf52b74db9f9e4c2d4178e |
grafana-debuginfo-7.5.15-3.el8.aarch64.rpm | SHA-256: 4194174ca5e4160f73bb4b9f2970db4f0c990b3f491bf0cb35b0a638a83aa9b0 |
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8
SRPM | |
---|---|
grafana-7.5.15-3.el8.src.rpm | SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8 |
aarch64 | |
grafana-7.5.15-3.el8.aarch64.rpm | SHA-256: b36ad4804efc28af2ccc81e24a48fc0edeedaed50edf52b74db9f9e4c2d4178e |
grafana-debuginfo-7.5.15-3.el8.aarch64.rpm | SHA-256: 4194174ca5e4160f73bb4b9f2970db4f0c990b3f491bf0cb35b0a638a83aa9b0 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8
SRPM | |
---|---|
grafana-7.5.15-3.el8.src.rpm | SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8 |
ppc64le | |
grafana-7.5.15-3.el8.ppc64le.rpm | SHA-256: e86be2c5f61014baf2fc8a5999ecce8619e57d99dc3602efb3387878c57e93e3 |
grafana-debuginfo-7.5.15-3.el8.ppc64le.rpm | SHA-256: ab01b45d53d885101059d2c9c72d4782ea0ba4cea9ac3d6b76f0227bf72e1b9c |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8
SRPM | |
---|---|
grafana-7.5.15-3.el8.src.rpm | SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8 |
x86_64 | |
grafana-7.5.15-3.el8.x86_64.rpm | SHA-256: 20f0a642b2f6ca8ad82ba0aedcb9edfc001dd91d71a129615b4453a204348be1 |
grafana-debuginfo-7.5.15-3.el8.x86_64.rpm | SHA-256: 434e25b5e14c344a5a5fa7bfbb6dd2fc589cfa7cfb1ce480560f28d068662133 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.