Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2022:7519 - Security Advisory
Issued:
2022-11-08
Updated:
2022-11-08

RHSA-2022:7519 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: grafana security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for grafana is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.

The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055348)

Security Fix(es):

  • sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648)
  • golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
  • golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
  • grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673)
  • prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
  • grafana: XSS vulnerability in data source handling (CVE-2022-21702)
  • grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703)
  • grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713)
  • golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
  • golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
  • golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
  • golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
  • golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
  • golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
  • golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.8 x86_64
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64

Fixes

  • BZ - 2044628 - CVE-2022-21673 grafana: Forward OAuth Identity Token can allow users to access some data sources
  • BZ - 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter
  • BZ - 2050648 - CVE-2022-21702 grafana: XSS vulnerability in data source handling
  • BZ - 2050742 - CVE-2022-21703 grafana: CSRF vulnerability can lead to privilege escalation
  • BZ - 2050743 - CVE-2022-21713 grafana: IDOR vulnerability can lead to information disclosure
  • BZ - 2055348 - Rebase of Grafana in RHEL 8.7
  • BZ - 2065290 - CVE-2021-23648 sanitize-url: XSS due to improper sanitization in sanitizeUrl function
  • BZ - 2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read
  • BZ - 2107371 - CVE-2022-30630 golang: io/fs: stack exhaustion in Glob
  • BZ - 2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header
  • BZ - 2107376 - CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions
  • BZ - 2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
  • BZ - 2107386 - CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob
  • BZ - 2107388 - CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode
  • BZ - 2107390 - CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip
  • BZ - 2107392 - CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal

CVEs

  • CVE-2021-23648
  • CVE-2022-1705
  • CVE-2022-1962
  • CVE-2022-21673
  • CVE-2022-21698
  • CVE-2022-21702
  • CVE-2022-21703
  • CVE-2022-21713
  • CVE-2022-28131
  • CVE-2022-30630
  • CVE-2022-30631
  • CVE-2022-30632
  • CVE-2022-30633
  • CVE-2022-30635
  • CVE-2022-32148

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
grafana-7.5.15-3.el8.src.rpm SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8
x86_64
grafana-7.5.15-3.el8.x86_64.rpm SHA-256: 20f0a642b2f6ca8ad82ba0aedcb9edfc001dd91d71a129615b4453a204348be1
grafana-debuginfo-7.5.15-3.el8.x86_64.rpm SHA-256: 434e25b5e14c344a5a5fa7bfbb6dd2fc589cfa7cfb1ce480560f28d068662133

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8

SRPM
grafana-7.5.15-3.el8.src.rpm SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8
x86_64
grafana-7.5.15-3.el8.x86_64.rpm SHA-256: 20f0a642b2f6ca8ad82ba0aedcb9edfc001dd91d71a129615b4453a204348be1
grafana-debuginfo-7.5.15-3.el8.x86_64.rpm SHA-256: 434e25b5e14c344a5a5fa7bfbb6dd2fc589cfa7cfb1ce480560f28d068662133

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8

SRPM
grafana-7.5.15-3.el8.src.rpm SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8
x86_64
grafana-7.5.15-3.el8.x86_64.rpm SHA-256: 20f0a642b2f6ca8ad82ba0aedcb9edfc001dd91d71a129615b4453a204348be1
grafana-debuginfo-7.5.15-3.el8.x86_64.rpm SHA-256: 434e25b5e14c344a5a5fa7bfbb6dd2fc589cfa7cfb1ce480560f28d068662133

Red Hat Enterprise Linux for IBM z Systems 8

SRPM
grafana-7.5.15-3.el8.src.rpm SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8
s390x
grafana-7.5.15-3.el8.s390x.rpm SHA-256: 09e15a87c8a0bc3226607da8db7e4f7c7d957563ef5d145bad0bcdd2cd3f13de
grafana-debuginfo-7.5.15-3.el8.s390x.rpm SHA-256: 6d535e30c35699f1e4a0e2b65ffbafa4fd046a726b2e318b9405b5d3d909a396

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8

SRPM
grafana-7.5.15-3.el8.src.rpm SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8
s390x
grafana-7.5.15-3.el8.s390x.rpm SHA-256: 09e15a87c8a0bc3226607da8db7e4f7c7d957563ef5d145bad0bcdd2cd3f13de
grafana-debuginfo-7.5.15-3.el8.s390x.rpm SHA-256: 6d535e30c35699f1e4a0e2b65ffbafa4fd046a726b2e318b9405b5d3d909a396

Red Hat Enterprise Linux for Power, little endian 8

SRPM
grafana-7.5.15-3.el8.src.rpm SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8
ppc64le
grafana-7.5.15-3.el8.ppc64le.rpm SHA-256: e86be2c5f61014baf2fc8a5999ecce8619e57d99dc3602efb3387878c57e93e3
grafana-debuginfo-7.5.15-3.el8.ppc64le.rpm SHA-256: ab01b45d53d885101059d2c9c72d4782ea0ba4cea9ac3d6b76f0227bf72e1b9c

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8

SRPM
grafana-7.5.15-3.el8.src.rpm SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8
ppc64le
grafana-7.5.15-3.el8.ppc64le.rpm SHA-256: e86be2c5f61014baf2fc8a5999ecce8619e57d99dc3602efb3387878c57e93e3
grafana-debuginfo-7.5.15-3.el8.ppc64le.rpm SHA-256: ab01b45d53d885101059d2c9c72d4782ea0ba4cea9ac3d6b76f0227bf72e1b9c

Red Hat Enterprise Linux Server - TUS 8.8

SRPM
grafana-7.5.15-3.el8.src.rpm SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8
x86_64
grafana-7.5.15-3.el8.x86_64.rpm SHA-256: 20f0a642b2f6ca8ad82ba0aedcb9edfc001dd91d71a129615b4453a204348be1
grafana-debuginfo-7.5.15-3.el8.x86_64.rpm SHA-256: 434e25b5e14c344a5a5fa7bfbb6dd2fc589cfa7cfb1ce480560f28d068662133

Red Hat Enterprise Linux for ARM 64 8

SRPM
grafana-7.5.15-3.el8.src.rpm SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8
aarch64
grafana-7.5.15-3.el8.aarch64.rpm SHA-256: b36ad4804efc28af2ccc81e24a48fc0edeedaed50edf52b74db9f9e4c2d4178e
grafana-debuginfo-7.5.15-3.el8.aarch64.rpm SHA-256: 4194174ca5e4160f73bb4b9f2970db4f0c990b3f491bf0cb35b0a638a83aa9b0

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8

SRPM
grafana-7.5.15-3.el8.src.rpm SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8
aarch64
grafana-7.5.15-3.el8.aarch64.rpm SHA-256: b36ad4804efc28af2ccc81e24a48fc0edeedaed50edf52b74db9f9e4c2d4178e
grafana-debuginfo-7.5.15-3.el8.aarch64.rpm SHA-256: 4194174ca5e4160f73bb4b9f2970db4f0c990b3f491bf0cb35b0a638a83aa9b0

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8

SRPM
grafana-7.5.15-3.el8.src.rpm SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8
ppc64le
grafana-7.5.15-3.el8.ppc64le.rpm SHA-256: e86be2c5f61014baf2fc8a5999ecce8619e57d99dc3602efb3387878c57e93e3
grafana-debuginfo-7.5.15-3.el8.ppc64le.rpm SHA-256: ab01b45d53d885101059d2c9c72d4782ea0ba4cea9ac3d6b76f0227bf72e1b9c

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8

SRPM
grafana-7.5.15-3.el8.src.rpm SHA-256: 6232a619abf10909c918e81c7819c997942e6cdd92a07470e724139029f209e8
x86_64
grafana-7.5.15-3.el8.x86_64.rpm SHA-256: 20f0a642b2f6ca8ad82ba0aedcb9edfc001dd91d71a129615b4453a204348be1
grafana-debuginfo-7.5.15-3.el8.x86_64.rpm SHA-256: 434e25b5e14c344a5a5fa7bfbb6dd2fc589cfa7cfb1ce480560f28d068662133

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility