First published: Thu Mar 27 2025(Updated: )
Important: grafana security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/grafana | <10.2.6-9.el9_5 | 10.2.6-9.el9_5 |
redhat/grafana | <10.2.6-9.el9_5 | 10.2.6-9.el9_5 |
redhat/grafana-debuginfo | <10.2.6-9.el9_5 | 10.2.6-9.el9_5 |
redhat/grafana-debugsource | <10.2.6-9.el9_5 | 10.2.6-9.el9_5 |
redhat/grafana-selinux | <10.2.6-9.el9_5 | 10.2.6-9.el9_5 |
redhat/grafana-debuginfo | <10.2.6-9.el9_5 | 10.2.6-9.el9_5 |
redhat/grafana-debugsource | <10.2.6-9.el9_5 | 10.2.6-9.el9_5 |
redhat/grafana-selinux | <10.2.6-9.el9_5 | 10.2.6-9.el9_5 |
redhat/grafana | <10.2.6-9.el9_5 | 10.2.6-9.el9_5 |
redhat/grafana-debuginfo | <10.2.6-9.el9_5 | 10.2.6-9.el9_5 |
redhat/grafana-debugsource | <10.2.6-9.el9_5 | 10.2.6-9.el9_5 |
redhat/grafana-selinux | <10.2.6-9.el9_5 | 10.2.6-9.el9_5 |
redhat/grafana | <10.2.6-9.el9_5.aa | 10.2.6-9.el9_5.aa |
redhat/grafana-debuginfo | <10.2.6-9.el9_5.aa | 10.2.6-9.el9_5.aa |
redhat/grafana-debugsource | <10.2.6-9.el9_5.aa | 10.2.6-9.el9_5.aa |
redhat/grafana-selinux | <10.2.6-9.el9_5.aa | 10.2.6-9.el9_5.aa |
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:3344 is classified as important due to the excessive memory allocation vulnerability.
To fix RHSA-2025:3344, upgrade Grafana to version 10.2.6-9.el9_5.
The affected software for RHSA-2025:3344 includes Grafana and its associated packages like grafana-debuginfo and grafana-selinux.
CVE-2025-30204 refers to the vulnerability in jwt-go that allows excessive memory allocation during header parsing.
The vulnerable versions in RHSA-2025:3344 are those prior to Grafana 10.2.6-9.el9_5.