ALSA-2023:6420

See a problem?
Source
https://errata.almalinux.org/9/ALSA-2023-6420.html
Import Source
https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2023:6420.json
JSON Data
https://api.osv.dev/v1/vulns/ALSA-2023:6420
Related
Published
2023-11-07T00:00:00Z
Modified
2023-11-14T12:05:09Z
Summary
Moderate: grafana security and enhancement update
Details

Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.

Security Fix(es):

  • grafana: persistent xss in grafana core plugins (CVE-2022-23552)
  • grafana: plugin signature bypass (CVE-2022-31123)
  • grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins (CVE-2022-31130)
  • grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins (CVE-2022-39201)
  • grafana: email addresses and usernames cannot be trusted (CVE-2022-39306)
  • grafana: User enumeration via forget password (CVE-2022-39307)
  • grafana: Spoofing of the originalUrl parameter of snapshots (CVE-2022-39324)
  • golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)
  • golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.

References

Affected packages

AlmaLinux:9 / grafana

Package

Name
grafana

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.2.10-7.el9_3.alma.1