Headline
RHSA-2022:5720: Red Hat Security Advisory: grafana security update
An update for grafana is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-31107: grafana: OAuth account takeover
Skip to navigation Skip to main content
Utilities
- Subscriptions
- Downloads
- Containers
- Support Cases
Infrastructure and Management
- Red Hat Enterprise Linux
- Red Hat Virtualization
- Red Hat Identity Management
- Red Hat Directory Server
- Red Hat Certificate System
- Red Hat Satellite
- Red Hat Subscription Management
- Red Hat Update Infrastructure
- Red Hat Insights
- Red Hat Ansible Automation Platform
Cloud Computing
- Red Hat OpenShift
- Red Hat CloudForms
- Red Hat OpenStack Platform
- Red Hat OpenShift Container Platform
- Red Hat OpenShift Data Science
- Red Hat OpenShift Online
- Red Hat OpenShift Dedicated
- Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Management for Kubernetes
- Red Hat Quay
- Red Hat CodeReady Workspaces
- Red Hat OpenShift Service on AWS
Storage
- Red Hat Gluster Storage
- Red Hat Hyperconverged Infrastructure
- Red Hat Ceph Storage
- Red Hat OpenShift Data Foundation
Runtimes
- Red Hat Runtimes
- Red Hat JBoss Enterprise Application Platform
- Red Hat Data Grid
- Red Hat JBoss Web Server
- Red Hat Single Sign On
- Red Hat support for Spring Boot
- Red Hat build of Node.js
- Red Hat build of Thorntail
- Red Hat build of Eclipse Vert.x
- Red Hat build of OpenJDK
- Red Hat build of Quarkus
Integration and Automation
- Red Hat Process Automation
- Red Hat Process Automation Manager
- Red Hat Decision Manager
All Products
Issued:
2022-07-26
Updated:
2022-07-26
RHSA-2022:5720 - Security Advisory
- Overview
- Updated Packages
Synopsis
Important: grafana security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for grafana is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Description
Grafana is an open source, feature rich metrics dashboard and graph editor for
Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
- grafana: OAuth account takeover (CVE-2022-31107)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64
Fixes
- BZ - 2104367 - CVE-2022-31107 grafana: OAuth account takeover
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1
SRPM
grafana-6.2.2-9.el8_1.src.rpm
SHA-256: cb1131df41be642f3cd6f03e9111a0327c0be185bf38cd359341012bc23c0078
ppc64le
grafana-6.2.2-9.el8_1.ppc64le.rpm
SHA-256: 64fca9d007369f3df2c451474c84bc0611d6475642358e1c5279cb8de825c33b
grafana-azure-monitor-6.2.2-9.el8_1.ppc64le.rpm
SHA-256: 3871773bc7664fe1a15e9e8bb7e918383d1719e00e064f73bb9d36629d5c8a57
grafana-cloudwatch-6.2.2-9.el8_1.ppc64le.rpm
SHA-256: e04fa568a035944776022aa7dedc8327234d4865c0259928c6676ce15bac637d
grafana-debuginfo-6.2.2-9.el8_1.ppc64le.rpm
SHA-256: 0546cbb5339c679cc43856ab7062d2adc814e901beede699aa6545ec511341b8
grafana-elasticsearch-6.2.2-9.el8_1.ppc64le.rpm
SHA-256: f8fa18298d9db7d1e7cf3d8998fe90105c468a919f66730eb236fd51304c8127
grafana-graphite-6.2.2-9.el8_1.ppc64le.rpm
SHA-256: 578c36055974f6cc8846df6396ce5a70a8430aabadd748c718d12241911c2a0c
grafana-influxdb-6.2.2-9.el8_1.ppc64le.rpm
SHA-256: 48a4fc1608c1891ee0f73eb16c3d2bf58fd5efbd3e8b425b3e34b12fabc8736d
grafana-loki-6.2.2-9.el8_1.ppc64le.rpm
SHA-256: 3c988eae57edcc099c51f49928ebec85787baf5b9a782a9fed0ed6192d3f9ea1
grafana-mssql-6.2.2-9.el8_1.ppc64le.rpm
SHA-256: 8a3547d80afd3649b6efc1ad82c952af7bd62f08be05af05661cecaf1f99ca76
grafana-mysql-6.2.2-9.el8_1.ppc64le.rpm
SHA-256: 9c377b8d2719f6a246c7e4ea1a805070f37f3efccfb33b7ae18d6616507e63e5
grafana-opentsdb-6.2.2-9.el8_1.ppc64le.rpm
SHA-256: 9af2b15a734a99ae8fd70f844de7b7a468d4a404d491d012ad27f13e33bf6bee
grafana-postgres-6.2.2-9.el8_1.ppc64le.rpm
SHA-256: a1807f3ae19d92e8c59a9ea05621dcc9b09aed66ef3e2d20b89c2b1625992154
grafana-prometheus-6.2.2-9.el8_1.ppc64le.rpm
SHA-256: d87b5a69b4a3822965f68af3b89d16bd92f45bea015e99bcea5548970e85fa87
grafana-stackdriver-6.2.2-9.el8_1.ppc64le.rpm
SHA-256: aff86a257af514d5756598636270a52031d26048c4dd482eedaf404249f9d958
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1
SRPM
grafana-6.2.2-9.el8_1.src.rpm
SHA-256: cb1131df41be642f3cd6f03e9111a0327c0be185bf38cd359341012bc23c0078
x86_64
grafana-6.2.2-9.el8_1.x86_64.rpm
SHA-256: 135ee8123bedea02dee20364448ef8cedf910570691494912227cbaa94a190af
grafana-azure-monitor-6.2.2-9.el8_1.x86_64.rpm
SHA-256: 84810474f1c4935899cbb1cf06314df3abb7735903bef1dd00a4a9203b2c3a88
grafana-cloudwatch-6.2.2-9.el8_1.x86_64.rpm
SHA-256: 1782e0278efa44b93a0b70e19dfc8beeb0cb0bfb145419285f62648e5d9b268c
grafana-debuginfo-6.2.2-9.el8_1.x86_64.rpm
SHA-256: dd3932729659b4bc9d4728f92565b1602d3ad301a62e3b521434f5ed61920bd1
grafana-elasticsearch-6.2.2-9.el8_1.x86_64.rpm
SHA-256: bb9e48d545b7d6484764f0ae94c5eecd96e34583e66d36ff5a4920907c23fe5a
grafana-graphite-6.2.2-9.el8_1.x86_64.rpm
SHA-256: c30a545757b90dc3c297304cd57e8668d649a13443289a11248973bec00e4a3a
grafana-influxdb-6.2.2-9.el8_1.x86_64.rpm
SHA-256: ef5330287f7e7f7618f3c87cc221063b2fdf51f0bcc691e5aa3c3afe9448eded
grafana-loki-6.2.2-9.el8_1.x86_64.rpm
SHA-256: 2310fa57904c3eee1270d389c003a3d8c01c6bc65bc5167be3cf5e9802ed7460
grafana-mssql-6.2.2-9.el8_1.x86_64.rpm
SHA-256: 0a3dc552cb8c3d90ab9b7e1f4ecd305a1ada45267d03f8ad0a18822952045731
grafana-mysql-6.2.2-9.el8_1.x86_64.rpm
SHA-256: 1eaf5a08ae1f32002864fb04ce21078e3fa3b2a032c3f5eba6e4c738a6ebfa20
grafana-opentsdb-6.2.2-9.el8_1.x86_64.rpm
SHA-256: 156add159f5afc2f899d6f160442c37bd0b14609789242a10d18a248bbfb4448
grafana-postgres-6.2.2-9.el8_1.x86_64.rpm
SHA-256: 99909840bca69e2affb52a9d6bc80635f68e2c5d8af742da4a43102b2c3924a9
grafana-prometheus-6.2.2-9.el8_1.x86_64.rpm
SHA-256: fc578c8720f220e10776799afdcc773eefe9253e5a4727815f4903884a69701a
grafana-stackdriver-6.2.2-9.el8_1.x86_64.rpm
SHA-256: 2b263dbb7c3d35239773cfb33b0a4dd0e50430a7374ae4f48c6ed128b9d3d64c
The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.
Related news
Today we are releasing Grafana 8.3.10, 8.4.10, 8.5.9 and 9.0.3. This patch release includes a HIGH severity security fix for an Oauth takeover vulnerability in Grafana. Release v.9.0.3, containing this security fix and other patches: - [Download Grafana 9.0.3](https://grafana.com/grafana/download/9.0.3) - [Release notes](https://grafana.com/docs/grafana/next/release-notes/release-notes-9-0-3/) Release v.8.5.9, containing this security fix and other fixes: - [Download Grafana 8.5.9](https://grafana.com/grafana/download/8.5.9) - [Release notes](https://grafana.com/docs/grafana/next/release-notes/release-notes-8-5-9/) Release v.8.4.10, containing this security fix and other fixes: - [Download Grafana 8.4.10](https://grafana.com/grafana/download/8.4.10) - [Release notes](https://grafana.com/docs/grafana/next/release-notes/release-notes-8-4-10/) Release v.8.3.10, containing this security fix and other fixes: - [Download Grafana 8.3.10](https://grafana.com/grafana/download/8.3.10) #...
Red Hat Security Advisory 2023-3642-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. This new container image is based on Red Hat Ceph Storage 6.1 and Red Hat Enterprise Linux 9. Issues addressed include bypass, cross site scripting, denial of service, information leakage, spoofing, and traversal vulnerabilities.
A new container image for Red Hat Ceph Storage 6.1 is now available in the Red Hat Ecosystem Catalog. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-42581: A flaw was found in the Ramda NPM package that involves prototype poisoning. This flaw allows attackers to supply a crafted object, affecting the integrity or availability of the application. * CVE-2022-1650: A flaw was found in the EventSource NPM Package. The description from the source states the following messa...
Red Hat Security Advisory 2022-8057-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Issues addressed include cross site request forgery, cross site scripting, denial of service, information leakage, and privilege escalation vulnerabilities.
An update for grafana is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23648: sanitize-url: XSS due to improper sanitization in sanitizeUrl function * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-21673: grafana: Forward OAuth Identity Token can allow users to access some data sources * CVE-2022-216...
Red Hat Security Advisory 2022-6283-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an OpenShift Container Platform installation. This advisory covers the RPM packages for the release.
Red Hat OpenShift Service Mesh 2.2.2 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob * CVE-2022-30633: golang: encoding/xml: stack exhaustion in Unmarshal * CVE-2022-30635: golang: encoding/gob: stack...
Red Hat Security Advisory 2022-5718-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Red Hat Security Advisory 2022-5719-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
An update for grafana is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31107: grafana: OAuth account takeover
An update for grafana is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31107: grafana: OAuth account takeover
An update for grafana is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31107: grafana: OAuth account takeover
An update for grafana is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31107: grafana: OAuth account takeover
Open source analytics platform fixes bug that could lead to authentication bypass, privilege escalation
Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will...
Grafana through 6.7.1 allows stored XSS due to insufficient input protection in the originalUrl field, which allows an attacker to inject JavaScript code that will be executed after clicking on Open Original Dashboard after visiting the snapshot.