{"id":"ALSA-2022:8057","summary":"Important: grafana security, bug fix, and enhancement update","details":"Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. \n\nThe following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055349)\n\nSecurity Fix(es):\n\n* sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648)\n* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\n* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)\n* grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673)\n* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)\n* grafana: XSS vulnerability in data source handling (CVE-2022-21702)\n* grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703)\n* grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713)\n* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)\n* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\n* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\n* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\n* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)\n* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)\n* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.","modified":"2026-02-04T03:02:46.644717Z","published":"2022-11-15T00:00:00Z","related":["CVE-2021-23648","CVE-2022-1705","CVE-2022-1962","CVE-2022-21673","CVE-2022-21698","CVE-2022-21702","CVE-2022-21703","CVE-2022-21713","CVE-2022-28131","CVE-2022-30630","CVE-2022-30631","CVE-2022-30632","CVE-2022-30633","CVE-2022-30635","CVE-2022-32148"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:8057"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-23648"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1705"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1962"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21673"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21698"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21702"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21703"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21713"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28131"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30630"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30631"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30632"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30633"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30635"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32148"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2044628"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2045880"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2050648"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2050742"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2050743"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2065290"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2107342"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2107371"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2107374"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2107376"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2107383"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2107386"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2107388"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2107390"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2107392"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2022-8057.html"}],"affected":[{"package":{"name":"grafana","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/grafana"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.5.15-3.el9"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2022:8057.json"}}],"schema_version":"1.7.3"}