grafana-10.2.6-4.el9

エラータID: AXSA:2024-9212:19

Release date: 
Thursday, December 12, 2024 - 14:08
Subject: 
grafana-10.2.6-4.el9
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.

Security Fix(es):

* golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788)
* golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789)
* golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (CVE-2024-24790)
* go-retryable[http:](http:) url might write sensitive information to log file (CVE-2024-6104)
* net/[http:](http:) Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the MIRACLE LINUX 9.5 Release Notes linked from the References section.

CVE-2024-24788
A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.
CVE-2024-24789
The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading the file. The archive/zip package now rejects files containing these errors.
CVE-2024-24790
The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms.
CVE-2024-24791
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
CVE-2024-6104
go-retryablehttp prior to 0.7.7 did not sanitize urls when writing them to its log file. This could lead to go-retryablehttp writing sensitive HTTP basic auth credentials to its log file. This vulnerability, CVE-2024-6104, was fixed in go-retryablehttp 0.7.7.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. grafana-10.2.6-4.el9.src.rpm
    MD5: e37501ac0cb969e50b605aaf07b1d838
    SHA-256: 1e28c2428b602241234849e5e3d6ac5c44d02831186d9afa9f71206ccadb3dd4
    Size: 335.89 MB

Asianux Server 9 for x86_64
  1. grafana-10.2.6-4.el9.x86_64.rpm
    MD5: 6f25f0c6a8688e6583d6eb2fe57b2a8a
    SHA-256: d7f568397362e5aa76b2c3576b009950bb64576d9354835a11151fde4301873f
    Size: 112.08 MB
  2. grafana-selinux-10.2.6-4.el9.x86_64.rpm
    MD5: 7f1115e1a1fba77941058e56487e1cd9
    SHA-256: 57fe2b9f321396aa7fe1fe84022172bf6bbb64fd4c9839ee5d678195d6beeb43
    Size: 26.21 kB