{"id":"ALSA-2023:6420","summary":"Moderate: grafana security and enhancement update","details":"Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. \n\nSecurity Fix(es):\n\n* grafana: persistent xss in grafana core plugins (CVE-2022-23552)\n* grafana: plugin signature bypass (CVE-2022-31123)\n* grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins (CVE-2022-31130)\n* grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins (CVE-2022-39201)\n* grafana: email addresses and usernames cannot be trusted (CVE-2022-39306)\n* grafana: User enumeration via forget password (CVE-2022-39307)\n* grafana: Spoofing of the originalUrl parameter of snapshots (CVE-2022-39324)\n* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.","modified":"2026-02-04T02:30:48.428078Z","published":"2023-11-07T00:00:00Z","related":["CVE-2022-23552","CVE-2022-31123","CVE-2022-31130","CVE-2022-39201","CVE-2022-39306","CVE-2022-39307","CVE-2022-39324","CVE-2022-41717","CVE-2023-24534"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:6420"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-23552"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-31123"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-31130"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-39201"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-39306"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-39307"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-39324"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41717"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24534"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2131146"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2131147"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2131148"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2138014"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2138015"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2148252"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2158420"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2161274"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2184483"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2023-6420.html"}],"affected":[{"package":{"name":"grafana","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/grafana"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.2.10-7.el9_3.alma.1"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2023:6420.json"}}],"schema_version":"1.7.3"}