Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2021:1859

Опубликовано: 18 мая 2021
Источник: rocky
Оценка: Moderate

Описание

Moderate: grafana security, bug fix, and enhancement update

Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.

The following packages have been upgraded to a later upstream version: grafana (7.3.6). (BZ#1850471)

Security Fix(es):

  • crewjam/saml: authentication bypass in saml authentication (CVE-2020-27846)

  • grafana: XSS via a query alias for the Elasticsearch and Testdata datasource (CVE-2020-24303)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
grafanax86_642.el8grafana-7.3.6-2.el8.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
больше 4 лет назад

ELSA-2021-1859: grafana security, bug fix, and enhancement update (MODERATE)

CVSS3: 9.8
redhat
около 5 лет назад

A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to bypass SAML Authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 9.8
nvd
почти 5 лет назад

A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to bypass SAML Authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 6.1
ubuntu
около 5 лет назад

Grafana before 7.1.0-beta 1 allows XSS via a query alias for the ElasticSearch datasource.

CVSS3: 6.1
redhat
больше 5 лет назад

Grafana before 7.1.0-beta 1 allows XSS via a query alias for the ElasticSearch datasource.