Hi,

You are receiving an AlmaLinux Security update email because you subscribed to 
receive errata notifications from AlmaLinux.

AlmaLinux: 9
Type: Security
Severity: Important
Release date: 2022-11-18

Summary:

Grafana is an open source, feature rich metrics dashboard and graph editor for 
Graphite, InfluxDB & OpenTSDB. 

The following packages have been upgraded to a later upstream version: grafana 
(7.5.15). (BZ#2055349)

Security Fix(es):

* sanitize-url: XSS due to improper sanitization in sanitizeUrl function 
(CVE-2021-23648)
* golang: net/http: improper sanitization of Transfer-Encoding header 
(CVE-2022-1705)
* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
* grafana: Forward OAuth Identity Token can allow users to access some data 
sources (CVE-2022-21673)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter 
(CVE-2022-21698)
* grafana: XSS vulnerability in data source handling (CVE-2022-21702)
* grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703)
* grafana: IDOR vulnerability can lead to information disclosure 
(CVE-2022-21713)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For 
not working (CVE-2022-32148)

For more details about the security issue(s), including the impact, a CVSS 
score, acknowledgments, and other related information, refer to the CVE page(s) 
listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release 
Notes linked from the References section.

Full details, updated packages, references, and other related information: 
https://errata.almalinux.org/9/ALSA-2022-8057.html

This message is automatically generated, please don’t reply. For further 
questions, please, contact us via the AlmaLinux community chat: 
https://chat.almalinux.org/.
Want to change your notification settings? Sign in and manage mailing lists on 
https://lists.almalinux.org.

Kind regards,
AlmaLinux Team

Reply via email to