[SUSE-SU-2023:2598-1] Security update for golang-github-prometheus-prometheus
Severity
Important
Affected Packages
16
CVEs
3
Security update for golang-github-prometheus-prometheus
This update for golang-github-prometheus-prometheus fixes the following issues:
golang-github-prometheus-prometheus:
- Security issues fixed in this version update to 2.37.6:
- CVE-2022-46146: Fix basic authentication bypass vulnerability (bsc#1208049, jsc#PED-3576)
- CVE-2022-41715: Update our regexp library to fix upstream (bsc#1204023)
- CVE-2022-41723: Fixed go issue to avoid quadratic complexity in HPACK decoding (bsc#1208298)
- Other non-security bugs fixed and changes in this version update to 2.37.6:
- [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a memory leak.
- [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus startup.
- [BUGFIX] Agent: Fix validation of flag options and prevent WAL from growing more than desired.
- [BUGFIX] Properly close file descriptor when logging unfinished queries.
- [BUGFIX] TSDB: In the WAL watcher metrics, expose the type='exemplar' label instead of type='unknown' for exemplar records.
- [BUGFIX] Alerting: Fix Alertmanager targets not being updated when alerts were queued.
- [BUGFIX] Hetzner SD: Make authentication files relative to Prometheus config file.
- [BUGFIX] Promtool: Fix promtool check config not erroring properly on failures.
- [BUGFIX] Scrape: Keep relabeled scrape interval and timeout on reloads.
- [BUGFIX] TSDB: Don't increment prometheus_tsdb_compactions_failed_total when context is canceled.
- [BUGFIX] TSDB: Fix panic if series is not found when deleting series.
- [BUGFIX] TSDB: Increase prometheus_tsdb_mmap_chunk_corruptions_total on out of sequence errors.
- [BUGFIX] Uyuni SD: Make authentication files relative to Prometheus configuration file and fix default configuration values.
- [BUGFIX] Fix serving of static assets like fonts and favicon.
- [BUGFIX] promtool: Add --lint-fatal option.
- [BUGFIX] Changing TotalQueryableSamples from int to int64.
- [BUGFIX] tsdb/agent: Ignore duplicate exemplars.
- [BUGFIX] TSDB: Fix chunk overflow appending samples at a variable rate.
- [BUGFIX] Stop rule manager before TSDB is stopped.
- [BUGFIX] Kubernetes SD: Explicitly include gcp auth from k8s.io.
- [BUGFIX] Fix OpenMetrics parser to sort uppercase labels correctly.
- [BUGFIX] UI: Fix scrape interval and duration tooltip not showing on target page.
- [BUGFIX] Tracing/GRPC: Set TLS credentials only when insecure is false.
- [BUGFIX] Agent: Fix ID collision when loading a WAL with multiple segments.
- [BUGFIX] Remote-write: Fix a deadlock between Batch and flushing the queue.
- [BUGFIX] PromQL: Properly return an error from histogram_quantile when metrics have the same labelset.
- [BUGFIX] UI: Fix bug that sets the range input to the resolution.
- [BUGFIX] TSDB: Fix a query panic when memory-snapshot-on-shutdown is enabled.
- [BUGFIX] Parser: Specify type in metadata parser errors.
- [BUGFIX] Scrape: Fix label limit changes not applying.
- [BUGFIX] Remote-write: Fix deadlock between adding to queue and getting batch.
- [BUGFIX] TSDB: Fix panic when m-mapping head chunks onto the disk.
- [BUGFIX] Azure SD: Fix a regression when public IP Address isn't set.
- [BUGFIX] Azure SD: Fix panic when public IP Address isn't set.
- [BUGFIX] Remote-write: Fix deadlock when stopping a shard.
- [BUGFIX] SD: Fix no such file or directory in K8s SD when not running inside K8s.
- [BUGFIX] Promtool: Make exit codes more consistent.
- [BUGFIX] Promtool: Fix flakiness of rule testing.
- [BUGFIX] Remote-write: Update prometheus_remote_storage_queue_highest_sent_timestamp_seconds metric when write irrecoverably fails.
- [BUGFIX] Storage: Avoid panic in BufferedSeriesIterator.
- [BUGFIX] TSDB: CompactBlockMetas should produce correct mint/maxt for overlapping blocks.
- [BUGFIX] TSDB: Fix logging of exemplar storage size.
- [BUGFIX] UI: Fix overlapping click targets for the alert state checkboxes.
- [BUGFIX] UI: Fix Unhealthy filter on target page to actually display only Unhealthy targets.
- [BUGFIX] UI: Fix autocompletion when expression is empty.
- [BUGFIX] TSDB: Fix deadlock from simultaneous GC and write.
- [CHANGE] TSDB: Delete *.tmp WAL files when Prometheus starts.
- [CHANGE] promtool: Add new flag --lint (enabled by default) for the commands check rules and check config, resulting in a new exit code (3) for linter errors.
- [CHANGE] UI: Classic UI removed.
- [CHANGE] Tracing: Migrate from Jaeger to OpenTelemetry based tracing.
- [CHANGE] PromQL: Promote negative offset and @ modifer to stable features.
- [CHANGE] Web: Promote remote-write-receiver to stable.
- [FEATURE] Nomad SD: New service discovery for Nomad built-in service discovery.
- [FEATURE] Add lowercase and uppercase relabel action.
- [FEATURE] SD: Add IONOS Cloud integration.
- [FEATURE] SD: Add Vultr integration.
- [FEATURE] SD: Add Linode SD failure count metric.
- [FEATURE] Add prometheus_ready metric.
- [FEATURE] Support for automatically setting the variable GOMAXPROCS to the container CPU limit.
Enable with the flag
--enable-feature=auto-gomaxprocs
. - [FEATURE] PromQL: Extend statistics with total and peak number of samples in a query.
Additionally, per-step statistics are available with --enable-feature=promql-per-step-stats and using
stats=all in the query API. Enable with the flag
--enable-feature=per-step-stats
. - [FEATURE] Config: Add stripPort template function.
- [FEATURE] Promtool: Add cardinality analysis to check metrics, enabled by flag --extended.
- [FEATURE] SD: Enable target discovery in own K8s namespace.
- [FEATURE] SD: Add provider ID label in K8s SD.
- [FEATURE] Web: Add limit field to the rules API.
- [ENHANCEMENT] Kubernetes SD: Allow attaching node labels for endpoint role.
- [ENHANCEMENT] PromQL: Optimise creation of signature with/without labels.
- [ENHANCEMENT] TSDB: Memory optimizations.
- [ENHANCEMENT] TSDB: Reduce sleep time when reading WAL.
- [ENHANCEMENT] OAuth2: Add appropriate timeouts and User-Agent header.
- [ENHANCEMENT] Add stripDomain to template function.
- [ENHANCEMENT] UI: Enable active search through dropped targets.
- [ENHANCEMENT] promtool: support matchers when querying label
- [ENHANCEMENT] Add agent mode identifier.
- [ENHANCEMENT] TSDB: more efficient sorting of postings read from WAL at startup.
- [ENHANCEMENT] Azure SD: Add metric to track Azure SD failures.
- [ENHANCEMENT] Azure SD: Add an optional resource_group configuration.
- [ENHANCEMENT] Kubernetes SD: Support discovery.k8s.io/v1 EndpointSlice (previously only discovery.k8s.io/v1beta1 EndpointSlice was supported).
- [ENHANCEMENT] Kubernetes SD: Allow attaching node metadata to discovered pods.
- [ENHANCEMENT] OAuth2: Support for using a proxy URL to fetch OAuth2 tokens.
- [ENHANCEMENT] Configuration: Add the ability to disable HTTP2.
- [ENHANCEMENT] Config: Support overriding minimum TLS version.
- [ENHANCEMENT] TSDB: Disable the chunk write queue by default and allow configuration with the experimental flag
--storage.tsdb.head-chunks-write-queue-size
. - [ENHANCEMENT] HTTP SD: Add a failure counter.
- [ENHANCEMENT] Azure SD: Set Prometheus User-Agent on requests.
- [ENHANCEMENT] Uyuni SD: Reduce the number of logins to Uyuni.
- [ENHANCEMENT] Scrape: Log when an invalid media type is encountered during a scrape.
- [ENHANCEMENT] Scrape: Accept application/openmetrics-text;version=1.0.0 in addition to version=0.0.1.
- [ENHANCEMENT] Remote-read: Add an option to not use external labels as selectors for remote read.
- [ENHANCEMENT] UI: Optimize the alerts page and add a search bar.
- [ENHANCEMENT] UI: Improve graph colors that were hard to see.
- [ENHANCEMENT] Config: Allow escaping of $ with $$ when using environment variables with external labels.
- [ENHANCEMENT] Remote-write: Avoid allocations by buffering concrete structs instead of interfaces.
- [ENHANCEMENT] Remote-write: Log time series details for out-of-order samples in remote write receiver.
- [ENHANCEMENT] Remote-write: Shard up more when backlogged.
- [ENHANCEMENT] TSDB: Use simpler map key to improve exemplar ingest performance.
- [ENHANCEMENT] TSDB: Avoid allocations when popping from the intersected postings heap.
- [ENHANCEMENT] TSDB: Make chunk writing non-blocking, avoiding latency spikes in remote-write.
- [ENHANCEMENT] TSDB: Improve label matching performance.
- [ENHANCEMENT] UI: Optimize the service discovery page and add a search bar.
- [ENHANCEMENT] UI: Optimize the target page and add a search bar.
- ID
- SUSE-SU-2023:2598-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20232598-1/
- Published
-
2023-06-21T13:17:39
(15 months ago) - Modified
-
2023-06-21T13:17:39
(15 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1731
- ALAS-2023-1825
- ALAS-2023-1849
- ALAS-2023-1866
- ALAS-2023-1881
- ALAS2-2022-1887
- ALAS2-2023-1913
- ALAS2-2023-2015
- ALAS2-2023-2143
- ALAS2-2023-2192
- ALAS2-2023-2193
- ALAS2-2023-2194
- ALAS2-2023-2238
- ALAS2-2023-2303
- ALPINE:CVE-2022-41715
- ALPINE:CVE-2022-41723
- ALPINE:CVE-2022-46146
- ALSA-2023:0328
- ALSA-2023:0446
- ALSA-2023:2167
- ALSA-2023:2204
- ALSA-2023:2357
- ALSA-2023:2780
- ALSA-2023:2784
- ALSA-2023:2866
- ALSA-2023:6346
- ALSA-2023:6363
- ALSA-2023:6402
- ALSA-2023:6473
- ALSA-2023:6474
- ALSA-2023:6938
- ALSA-2023:6939
- ALSA-2024:0121
- ALSA-2024:3254
- ELSA-2022-24267
- ELSA-2023-0328
- ELSA-2023-0446
- ELSA-2023-18908
- ELSA-2023-2167
- ELSA-2023-2204
- ELSA-2023-2357
- ELSA-2023-2592
- ELSA-2023-2780
- ELSA-2023-2784
- ELSA-2023-2866
- ELSA-2023-6363
- ELSA-2023-6402
- ELSA-2023-6473
- ELSA-2023-6474
- ELSA-2023-6938
- ELSA-2023-6939
- ELSA-2024-0121
- ELSA-2024-2988
- ELSA-2024-3254
- FEDORA-2022-0e313cc582
- FEDORA-2022-59a20edab2
- FEDORA-2023-1b25579262
- FEDORA-2023-28c182b657
- FEDORA-2023-327346caa5
- FEDORA-2023-3737bc1c0a
- FEDORA-2023-8c02aee138
- FEDORA-2023-a5a5542890
- FEDORA-2023-abb47e24d8
- FEDORA-2023-c1318fb7f8
- FEDORA-2023-ca444fdecf
- FEDORA-2023-cb20f08a4e
- FEDORA-2023-ccaf5538dd
- FEDORA-2023-cf176d02d8
- FEDORA-2023-e359fd31d2
- FREEBSD:3D73E384-AD1F-11ED-983C-83FE35862E3A
- FREEBSD:791A09C5-A086-11ED-954D-B42E991FC52E
- FREEBSD:854C2AFB-4424-11ED-AF97-ADCABF310F9B
- FREEBSD:D835C54F-A4BD-11ED-B6AF-B42E991FC52E
- GLSA-202311-09
- GLSA-202401-15
- GO-2022-1039
- GO-2022-1130
- GO-2023-1571
- MS:CVE-2022-41723
- RHBA-2023:2181
- RHSA-2023:0328
- RHSA-2023:0446
- RHSA-2023:2167
- RHSA-2023:2204
- RHSA-2023:2357
- RHSA-2023:2592
- RHSA-2023:2780
- RHSA-2023:2784
- RHSA-2023:2866
- RHSA-2023:3083
- RHSA-2023:6346
- RHSA-2023:6363
- RHSA-2023:6402
- RHSA-2023:6473
- RHSA-2023:6474
- RHSA-2023:6938
- RHSA-2023:6939
- RHSA-2023:7058
- RHSA-2024:0121
- RHSA-2024:2988
- RHSA-2024:3254
- RLSA-2023:0328
- RLSA-2023:0446
- SUSE-SU-2022:3668-1
- SUSE-SU-2022:3669-1
- SUSE-SU-2023:0460-1
- SUSE-SU-2023:0465-1
- SUSE-SU-2023:0467-1
- SUSE-SU-2023:0733-1
- SUSE-SU-2023:0735-1
- SUSE-SU-2023:0811-1
- SUSE-SU-2023:0812-1
- SUSE-SU-2023:0821-1
- SUSE-SU-2023:0869-1
- SUSE-SU-2023:0871-1
- SUSE-SU-2023:1857-1
- SUSE-SU-2023:1858-1
- SUSE-SU-2023:1859-1
- SUSE-SU-2023:2182-1
- SUSE-SU-2023:2183-1
- SUSE-SU-2023:2185-1
- SUSE-SU-2023:2187-1
- SUSE-SU-2023:2312-1
- SUSE-SU-2023:2578-1
- SUSE-SU-2023:2579-1
- SUSE-SU-2023:2594-1
- SUSE-SU-2023:3867-1
- SUSE-SU-2023:3868-1
- SUSE-SU-2023:3875-1
- SUSE-SU-2023:4124-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- SUSE-SU-2024:0486-1
- SUSE-SU-2024:0487-1
- USN-6038-1
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2598-1.json | |
Suse | URL for SUSE-SU-2023:2598-1 | https://www.suse.com/support/update/announcement/2023/suse-su-20232598-1/ | |
Suse | E-Mail link for SUSE-SU-2023:2598-1 | https://lists.suse.com/pipermail/sle-updates/2024-February/034404.html | |
Bugzilla | SUSE Bug 1204023 | https://bugzilla.suse.com/1204023 | |
Bugzilla | SUSE Bug 1208049 | https://bugzilla.suse.com/1208049 | |
Bugzilla | SUSE Bug 1208298 | https://bugzilla.suse.com/1208298 | |
CVE | SUSE CVE CVE-2022-41715 page | https://www.suse.com/security/cve/CVE-2022-41715/ | |
CVE | SUSE CVE CVE-2022-41723 page | https://www.suse.com/security/cve/CVE-2022-41723/ | |
CVE | SUSE CVE CVE-2022-46146 page | https://www.suse.com/security/cve/CVE-2022-46146/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/golang-github-prometheus-prometheus?arch=x86_64&distro=opensuse-leap-15.5 | suse | golang-github-prometheus-prometheus | < 2.37.6-150100.4.17.1 | opensuse-leap-15.5 | x86_64 | |
Affected | pkg:rpm/suse/golang-github-prometheus-prometheus?arch=x86_64&distro=opensuse-leap-15.4 | suse | golang-github-prometheus-prometheus | < 2.37.6-150100.4.17.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/golang-github-prometheus-prometheus?arch=s390x&distro=opensuse-leap-15.5 | suse | golang-github-prometheus-prometheus | < 2.37.6-150100.4.17.1 | opensuse-leap-15.5 | s390x | |
Affected | pkg:rpm/suse/golang-github-prometheus-prometheus?arch=s390x&distro=opensuse-leap-15.4 | suse | golang-github-prometheus-prometheus | < 2.37.6-150100.4.17.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/golang-github-prometheus-prometheus?arch=ppc64le&distro=opensuse-leap-15.5 | suse | golang-github-prometheus-prometheus | < 2.37.6-150100.4.17.1 | opensuse-leap-15.5 | ppc64le | |
Affected | pkg:rpm/suse/golang-github-prometheus-prometheus?arch=ppc64le&distro=opensuse-leap-15.4 | suse | golang-github-prometheus-prometheus | < 2.37.6-150100.4.17.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/golang-github-prometheus-prometheus?arch=aarch64&distro=opensuse-leap-15.5 | suse | golang-github-prometheus-prometheus | < 2.37.6-150100.4.17.1 | opensuse-leap-15.5 | aarch64 | |
Affected | pkg:rpm/suse/golang-github-prometheus-prometheus?arch=aarch64&distro=opensuse-leap-15.4 | suse | golang-github-prometheus-prometheus | < 2.37.6-150100.4.17.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/firewalld-prometheus-config?arch=x86_64&distro=opensuse-leap-15.5 | suse | firewalld-prometheus-config | < 0.1-150100.4.17.1 | opensuse-leap-15.5 | x86_64 | |
Affected | pkg:rpm/suse/firewalld-prometheus-config?arch=x86_64&distro=opensuse-leap-15.4 | suse | firewalld-prometheus-config | < 0.1-150100.4.17.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/firewalld-prometheus-config?arch=s390x&distro=opensuse-leap-15.5 | suse | firewalld-prometheus-config | < 0.1-150100.4.17.1 | opensuse-leap-15.5 | s390x | |
Affected | pkg:rpm/suse/firewalld-prometheus-config?arch=s390x&distro=opensuse-leap-15.4 | suse | firewalld-prometheus-config | < 0.1-150100.4.17.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/firewalld-prometheus-config?arch=ppc64le&distro=opensuse-leap-15.5 | suse | firewalld-prometheus-config | < 0.1-150100.4.17.1 | opensuse-leap-15.5 | ppc64le | |
Affected | pkg:rpm/suse/firewalld-prometheus-config?arch=ppc64le&distro=opensuse-leap-15.4 | suse | firewalld-prometheus-config | < 0.1-150100.4.17.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/firewalld-prometheus-config?arch=aarch64&distro=opensuse-leap-15.5 | suse | firewalld-prometheus-config | < 0.1-150100.4.17.1 | opensuse-leap-15.5 | aarch64 | |
Affected | pkg:rpm/suse/firewalld-prometheus-config?arch=aarch64&distro=opensuse-leap-15.4 | suse | firewalld-prometheus-config | < 0.1-150100.4.17.1 | opensuse-leap-15.4 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |