grafana-7.5.9-4.el8

エラータID: AXSA:2021-2800:06

Release date: 
Monday, December 20, 2021 - 09:41
Subject: 
grafana-7.5.9-4.el8
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.

The following packages have been upgraded to a later upstream version: grafana (7.5.9).

Security Fix(es):

* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)
* grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call (CVE-2021-27358)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2021-27358
The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.
CVE-2021-3114
In Go before 1.14.14 and 1.15.x before 1.15.7, crypto/elliptic/p224.go can generate incorrect outputs, related to an underflow of the lowest limb during the final complete reduction in the P-224 field.
CVE-2021-33195
Go before 1.15.13 and 1.16.x before 1.16.5 has functions for DNS lookups that do not validate replies from DNS servers, and thus a return value may contain an unsafe injection (e.g., XSS) that does not conform to the RFC1035 format.
CVE-2021-33197
In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.
CVE-2021-34558
The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. grafana-7.5.9-4.el8.src.rpm
    MD5: 05244e7ae6a2456203a66e69a6ec2063
    SHA-256: d6cd3bffb7f7ecc0f606e4cdbde633370c6ac7c9adb2a7e0c8716fe49ae00277
    Size: 121.92 MB

Asianux Server 8 for x86_64
  1. grafana-7.5.9-4.el8.x86_64.rpm
    MD5: 73470b6619edb41ceb4e4428a78bb639
    SHA-256: f3a9e039e397c3369b8a8920296a471b74fe9c00b816110ffcd0513f6d9614da
    Size: 40.68 MB