Количество 43
Количество 43

RLSA-2024:3265
Important: grafana security update

RLSA-2024:2568
Moderate: grafana security update
ELSA-2024-3265
ELSA-2024-3265: grafana security update (IMPORTANT)
ELSA-2024-2568
ELSA-2024-2568: grafana security update (MODERATE)

CVE-2024-1313
It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CVE-2024-1313
It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CVE-2024-1313
It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.
CVE-2024-1313
It is possible for a user in a different organization from the owner o ...

CVE-2024-1394
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.

CVE-2024-1394
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
GHSA-67rv-qpw2-6qrr
Grafana: Users outside an organization can delete a snapshot with its key

BDU:2024-04116
Уязвимость веб-инструмента представления данных Grafana, связанная с обходом авторизации, позволяющая нарушителю обойти процесс авторизации и удалить моментальный снимок

RLSA-2024:4502
Important: skopeo security update

RLSA-2024:2569
Important: grafana-pcp security update

RLSA-2024:1646
Important: grafana security and bug fix update

RLSA-2024:1644
Important: grafana-pcp security and bug fix update

RLSA-2024:1502
Important: grafana-pcp security update
GHSA-78hx-gp6g-7mj6
Memory leaks in code encrypting and verifying RSA payloads
ELSA-2024-4762
ELSA-2024-4762: runc security update (IMPORTANT)
ELSA-2024-4761
ELSA-2024-4761: containernetworking-plugins security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | RLSA-2024:3265 Important: grafana security update | около 1 года назад | ||
![]() | RLSA-2024:2568 Moderate: grafana security update | около 1 года назад | ||
ELSA-2024-3265 ELSA-2024-3265: grafana security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-2568 ELSA-2024-2568: grafana security update (MODERATE) | около 1 года назад | |||
![]() | CVE-2024-1313 It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5. | CVSS3: 6.5 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-1313 It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5. | CVSS3: 6.5 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-1313 It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5. | CVSS3: 6.5 | 0% Низкий | около 1 года назад |
CVE-2024-1313 It is possible for a user in a different organization from the owner o ... | CVSS3: 6.5 | 0% Низкий | около 1 года назад | |
![]() | CVE-2024-1394 A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them. | CVSS3: 7.5 | 1% Низкий | около 1 года назад |
![]() | CVE-2024-1394 A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them. | CVSS3: 7.5 | 1% Низкий | около 1 года назад |
GHSA-67rv-qpw2-6qrr Grafana: Users outside an organization can delete a snapshot with its key | CVSS3: 6.5 | 0% Низкий | около 1 года назад | |
![]() | BDU:2024-04116 Уязвимость веб-инструмента представления данных Grafana, связанная с обходом авторизации, позволяющая нарушителю обойти процесс авторизации и удалить моментальный снимок | CVSS3: 6.5 | 0% Низкий | около 1 года назад |
![]() | RLSA-2024:4502 Important: skopeo security update | 1% Низкий | 11 месяцев назад | |
![]() | RLSA-2024:2569 Important: grafana-pcp security update | 1% Низкий | около 1 года назад | |
![]() | RLSA-2024:1646 Important: grafana security and bug fix update | 1% Низкий | около 1 года назад | |
![]() | RLSA-2024:1644 Important: grafana-pcp security and bug fix update | 1% Низкий | около 1 года назад | |
![]() | RLSA-2024:1502 Important: grafana-pcp security update | 1% Низкий | около 1 года назад | |
GHSA-78hx-gp6g-7mj6 Memory leaks in code encrypting and verifying RSA payloads | CVSS3: 7.5 | 1% Низкий | около 1 года назад | |
ELSA-2024-4762 ELSA-2024-4762: runc security update (IMPORTANT) | 11 месяцев назад | |||
ELSA-2024-4761 ELSA-2024-4761: containernetworking-plugins security update (IMPORTANT) | 11 месяцев назад |
Уязвимостей на страницу