<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update golang-github-prometheus-prometheus</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:0546-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-02-14T07:24:38Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-02-14T07:24:38Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-02-14T07:24:38Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update golang-github-prometheus-prometheus</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">

golang-github-prometheus-prometheus was updated from version 2.45.6 to 2.53.3 (jsc#PED-11649):

- Security issues fixed:
  * CVE-2024-51744: Updated golang-jwt to version 5.0 to fix bad error
    handling (bsc#1232970)

- Highlights of other changes:
  * Performance: 
    + Significant enhancements to PromQL execution speed, TSDB operations (especially querying and compaction) and 
      remote write operations.
    + Default GOGC value lowered to 75 for better memory management. 
    + Option to limit memory usage from dropped targets added.
  * New Features:
    + Experimental OpenTelemetry ingestion.
    + Automatic memory limit handling.
    + Native histogram support, including new functions, UI enhancements, and improved scraping.
    + Improved alerting features, such as relabeling rules for AlertmanagerConfig and a new query_offset option.
    + Expanded service discovery options with added metadata and support for new services.
    + New promtool commands for PromQL formatting, label manipulation, metric pushing, and OpenMetrics dumping.
  * Bug Fixes: 
    + Numerous fixes across scraping, API, TSDB, PromQL, and service discovery.
  * For a detailed list of changes consult the package changelog or 
    https://github.com/prometheus/prometheus/compare/v2.45.6...v2.53.3
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-546,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-546,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2025-546,openSUSE-SLE-15.6-2025-546</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250546-1/</URL>
      <Description>Link for SUSE-SU-2025:0546-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-February/020340.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:0546-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232970</URL>
      <Description>SUSE Bug 1232970</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-51744/</URL>
      <Description>SUSE CVE CVE-2024-51744 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Package Hub 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Package Hub 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP6" CPE="cpe:/o:suse:packagehub:15:sp6">SUSE Linux Enterprise Module for Package Hub 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Proxy Module 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Proxy Module 4.3">
        <FullProductName ProductID="SUSE Manager Proxy Module 4.3" CPE="cpe:/o:suse:sle-module-suse-manager-proxy:4.3">SUSE Manager Proxy Module 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="firewalld-prometheus-config-0.1-150100.4.23.1">
      <FullProductName ProductID="firewalld-prometheus-config-0.1-150100.4.23.1">firewalld-prometheus-config-0.1-150100.4.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="golang-github-prometheus-prometheus-2.53.3-150100.4.23.1">
      <FullProductName ProductID="golang-github-prometheus-prometheus-2.53.3-150100.4.23.1">golang-github-prometheus-prometheus-2.53.3-150100.4.23.1</FullProductName>
    </Branch>
    <Relationship ProductReference="golang-github-prometheus-prometheus-2.53.3-150100.4.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP6:golang-github-prometheus-prometheus-2.53.3-150100.4.23.1">golang-github-prometheus-prometheus-2.53.3-150100.4.23.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="golang-github-prometheus-prometheus-2.53.3-150100.4.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy Module 4.3">
      <FullProductName ProductID="SUSE Manager Proxy Module 4.3:golang-github-prometheus-prometheus-2.53.3-150100.4.23.1">golang-github-prometheus-prometheus-2.53.3-150100.4.23.1 as a component of SUSE Manager Proxy Module 4.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="firewalld-prometheus-config-0.1-150100.4.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:firewalld-prometheus-config-0.1-150100.4.23.1">firewalld-prometheus-config-0.1-150100.4.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="golang-github-prometheus-prometheus-2.53.3-150100.4.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:golang-github-prometheus-prometheus-2.53.3-150100.4.23.1">golang-github-prometheus-prometheus-2.53.3-150100.4.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behaviour of an established function and is not 100 % backwards compatible, so updating to 4.5.1 might break your code. In case you cannot update to 4.5.0, please make sure that you are properly checking for all errors ("dangerous" ones first), so that you are not running in the case detailed above.</Note>
    </Notes>
    <CVE>CVE-2024-51744</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:golang-github-prometheus-prometheus-2.53.3-150100.4.23.1</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:golang-github-prometheus-prometheus-2.53.3-150100.4.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:firewalld-prometheus-config-0.1-150100.4.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:golang-github-prometheus-prometheus-2.53.3-150100.4.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250546-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-51744.html</URL>
        <Description>CVE-2024-51744</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232936</URL>
        <Description>SUSE Bug 1232936</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
