Описание
Security update golang-github-prometheus-prometheus
golang-github-prometheus-prometheus was updated from version 2.45.6 to 2.53.3 (jsc#PED-11649):
-
Security issues fixed:
- CVE-2024-51744: Updated golang-jwt to version 5.0 to fix bad error handling (bsc#1232970)
-
Highlights of other changes:
- Performance:
- Significant enhancements to PromQL execution speed, TSDB operations (especially querying and compaction) and remote write operations.
- Default GOGC value lowered to 75 for better memory management.
- Option to limit memory usage from dropped targets added.
- New Features:
- Experimental OpenTelemetry ingestion.
- Automatic memory limit handling.
- Native histogram support, including new functions, UI enhancements, and improved scraping.
- Improved alerting features, such as relabeling rules for AlertmanagerConfig and a new query_offset option.
- Expanded service discovery options with added metadata and support for new services.
- New promtool commands for PromQL formatting, label manipulation, metric pushing, and OpenMetrics dumping.
- Bug Fixes:
- Numerous fixes across scraping, API, TSDB, PromQL, and service discovery.
- For a detailed list of changes consult the package changelog or https://github.com/prometheus/prometheus/compare/v2.45.6...v2.53.3
- Performance:
Список пакетов
SUSE Linux Enterprise Module for Package Hub 15 SP6
SUSE Manager Proxy Module 4.3
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2025:0546-1
- E-Mail link for SUSE-SU-2025:0546-1
- SUSE Security Ratings
- SUSE Bug 1232970
- SUSE CVE CVE-2024-51744 page
Описание
golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behaviour of an established function and is not 100 % backwards compatible, so updating to 4.5.1 might break your code. In case you cannot update to 4.5.0, please make sure that you are properly checking for all errors ("dangerous" ones first), so that you are not running in the case detailed above.
Затронутые продукты
Ссылки
- CVE-2024-51744
- SUSE Bug 1232936