Re: Grafana version

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I appreciate the detailed response. It’s not a huge concern. Nothing is externally facing. It’s just more about making those red flags disappear from my scanner reports.

Thanks!
-jeremy

> On Thursday, Jan 27, 2022 at 3:27 AM, Ernesto Puerta <epuertat@xxxxxxxxxx (mailto:epuertat@xxxxxxxxxx)> wrote:
> Hi Jeremy,
>
> You can find here
> <https://github.com/ceph/ceph/blob/master/monitoring/grafana/build/README.md>
> (thanks Sebastian for the link) how to build a custom Ceph-Grafana image.
>
> That said, I wouldn't be too worried (only) about these specific CVEs since
> the monitoring stack (Grafana-Prometheus) is resource intensive so:
>
> - With anonymous access (Grafana default), there are so many other ways
> to trigger a DDoS (complex PromQL queries to name a simple one) that you
> should definitely ensure that the monitoring stack is only reachable from
> within a trusted environment and never exposed to public networks.
> - Or you should disable anonymous mode and enable Grafana User
> Authentication <https://grafana.com/docs/grafana/latest/auth/> (e.g.:
> LDAP or Auth Proxy) and/or IP allowlist (more on Grafana securitization
> <https://grafana.com/docs/grafana/latest/administration/security/>).
> - Or rely on a secure reverse proxy (the k8s way).
>
> In any case, thank you for raising concern on those! We hope to move to
> Grafana 7.x/8.x soon (6.x doesn't fix all these CVEs and we still need to
> validate that the existing dashboards don't break with newer versions).
>
> Kind Regards,
> Ernesto
>
>
> On Thu, Jan 27, 2022 at 7:53 AM Jeremy Hansen <jeremy@xxxxxxxxxx> wrote:
>
> > Finally following up on this. I missed the replies. Thank you for this.
> > Is there any clues as to what image the original is derived from? I guess
> > I’m looking to see if there’s a drop in replacement that would get me
> > around these security alerts without having to build my own.
> >
> > FYI, this one gets flagged as well, which seems to affect the community
> > version:
> >
> > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27358
> >
> > -jeremy
> >
> >
> >
> > On Tuesday, Jan 11, 2022 at 6:22 AM, Alfonso Martinez Hidalgo <
> > almartin@xxxxxxxxxx> wrote:
> > Hi Jeremy,
> >
> > Thanks for the heads up!
> >
> > I cannot open the provided links.
> >
> > AFAIK you can set a custom grafana image by running:
> >
> > ceph config set mgr mgr/cephadm/container_image_grafana <url-to-your-image>
> >
> > and then re-deploying the service. Plase see:
> >
> > https://docs.ceph.com/en/pacific/cephadm/services/monitoring/#using-custom-images
> >
> > Regards,
> >
> > On Tue, Jan 4, 2022 at 4:14 AM Jeremy Hansen <jeremy@xxxxxxxxxx> wrote:
> >
> > > I’m running 16.2.7 Pacific with Cephadm. Is there a way to upgrade an
> > > individual component without breaking orchestration? I’m just trying to
> > > clean up security issues and my scanner found problems with the version of
> > > Grafana Ceph deploys:
> > >
> > > CVE
> > > CVE-2021-28148 (https://gsa.la1.clx.corp/cve/CVE-2021-28148)
> > >
> > > CERT
> > >
> > > DFN-CERT-2021-1741 (
> > > https://gsa.la1.clx.corp/dfncert/DFN-CERT-2021-1741)DFN-CERT-2021-1739 (
> > > https://gsa.la1.clx.corp/dfncert/DFN-CERT-2021-1739)CB-K21/0293 (
> > > https://gsa.la1.clx.corp/certbund/CB-K21%2F0293)
> > >
> > > Summary
> > > Grafana is prone to a denial of service (DoS) vulnerability.
> > >
> > > Detection Result
> > > Installed version: 6.7.4 Fixed version: 6.7.6 Installation path / port: /
> > >
> > > Thanks
> > > -jeremy
> > >
> > > _______________________________________________
> > > ceph-users mailing list -- ceph-users@xxxxxxx
> > > To unsubscribe send an email to ceph-users-leave@xxxxxxx
> > >
> >
> >
> > --
> >
> > Alfonso Martínez
> >
> > Senior Software Engineer, Ceph Storage
> >
> > Red Hat <https://www.redhat.com>
> > <https://red.ht/sig>
> >
> >
> _______________________________________________
> ceph-users mailing list -- ceph-users@xxxxxxx
> To unsubscribe send an email to ceph-users-leave@xxxxxxx
_______________________________________________
ceph-users mailing list -- ceph-users@xxxxxxx
To unsubscribe send an email to ceph-users-leave@xxxxxxx

[Index of Archives]     [Information on CEPH]     [Linux Filesystem Development]     [Ceph Development]     [Ceph Large]     [Ceph Dev]     [Linux USB Development]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [xfs]


  Powered by Linux