Security update for Prometheus
| Announcement ID: | SUSE-SU-2026:1008-1 |
|---|---|
| Release Date: | 2026-03-25T10:08:17Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves five vulnerabilities and contains two features can now be installed.
Description:
This update for Prometheus fixes the following issues:
golang-github-prometheus-alertmanager, golang-github-prometheus-node_exporter:
- Internal changes to fix build issues with no impact for customers
golang-github-prometheus-prometheus:
-
Security issues fixed:
-
CVE-2026-27606: Fixed arbitrary file write via path traversal in rollup (bsc#1258893)
- CVE-2026-25547: Fixed unbounded brace range expansion leading to excessive CPU and memory consumption (bsc#1257841)
- CVE-2026-1615, CVE-2025-61140 The old web UI is no longer built due to security issues (bsc#1257897, bsc#1257442)
- CVE-2025-13465: Bump lodash package to version 4.17.23 to fix prototype pollution vulnerability (bsc#1257329)
-
CVE-2025-12816: Interpretation conflict vulnerability allowing bypassing cryptographic verifications (bsc#1255588)
-
Version update from 2.53.4 to 3.5.0 with the following highlighted changes (jsc#PED-13824):
-
Modernized Interface: Introduced a brand-new UI
- Enhanced Cloud and Auth: Added unified AWS service discovery (EC2, ECS, Lightsail) and Azure Workload Identity support for more secure, native cloudauthentication.
- Performance Standards: Fully integrated OpenTelemetry (OTLP) ingestion and moved Native Histograms from experimental to a stable feature.
- Advanced Data Export: Rolled out Remote Write 2.0, offering better performance and metadata handling when sending data to external systems.
- Query Power: Added new PromQL functions (like first_over_time and last_over_time) and optimization for grouping operations.
- Better Visibility: The UI now displays detailed relabeling steps, scrape intervals, and timeouts, making it easier to troubleshoot why targets aren't reporting correctly.
- Critical Fixes: Resolved significant memory leaks related to query logging and fixed bugs where targets were accidentally being scraped multiple times.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1008=1 -
SUSE Manager Client Tools for SLE 15
zypper in -t patch SUSE-SLE-Manager-Tools-15-2026-1008=1 -
SUSE Manager Client Tools for SLE Micro 5
zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2026-1008=1 -
Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1008=1 -
SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-1008=1 -
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1008=1 -
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1008=1 -
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1008=1 -
SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1008=1 -
SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1008=1 -
SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1008=1 -
SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1008=1 -
SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1008=1 -
SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1008=1 -
SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1008=1
Package List:
-
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
- golang-github-prometheus-alertmanager-debuginfo-0.28.1-150100.4.31.1
- golang-github-prometheus-prometheus-3.5.0-150100.4.29.1
- golang-github-prometheus-alertmanager-0.28.1-150100.4.31.1
- golang-github-prometheus-node_exporter-1.9.1-150100.3.38.1
- firewalld-prometheus-config-0.1-150100.4.29.1
-
SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64)
- golang-github-prometheus-alertmanager-0.28.1-150100.4.31.1
-
SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64)
- golang-github-prometheus-node_exporter-1.9.1-150100.3.38.1
-
Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
- golang-github-prometheus-node_exporter-debuginfo-1.9.1-150100.3.38.1
- golang-github-prometheus-node_exporter-1.9.1-150100.3.38.1
-
SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
- golang-github-prometheus-prometheus-3.5.0-150100.4.29.1
- golang-github-prometheus-alertmanager-0.28.1-150100.4.31.1
- golang-github-prometheus-prometheus-debuginfo-3.5.0-150100.4.29.1
- golang-github-prometheus-alertmanager-debuginfo-0.28.1-150100.4.31.1
-
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64)
- golang-github-prometheus-node_exporter-1.9.1-150100.3.38.1
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64)
- golang-github-prometheus-node_exporter-1.9.1-150100.3.38.1
-
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64)
- golang-github-prometheus-node_exporter-1.9.1-150100.3.38.1
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64)
- golang-github-prometheus-node_exporter-1.9.1-150100.3.38.1
-
SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
- golang-github-prometheus-node_exporter-1.9.1-150100.3.38.1
-
SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
- golang-github-prometheus-node_exporter-1.9.1-150100.3.38.1
-
SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
- golang-github-prometheus-node_exporter-1.9.1-150100.3.38.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
- golang-github-prometheus-node_exporter-1.9.1-150100.3.38.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
- golang-github-prometheus-node_exporter-1.9.1-150100.3.38.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
- golang-github-prometheus-node_exporter-1.9.1-150100.3.38.1
References:
- https://www.suse.com/security/cve/CVE-2025-12816.html
- https://www.suse.com/security/cve/CVE-2025-13465.html
- https://www.suse.com/security/cve/CVE-2025-61140.html
- https://www.suse.com/security/cve/CVE-2026-1615.html
- https://www.suse.com/security/cve/CVE-2026-25547.html
- https://bugzilla.suse.com/show_bug.cgi?id=1255588
- https://bugzilla.suse.com/show_bug.cgi?id=1257329
- https://bugzilla.suse.com/show_bug.cgi?id=1257442
- https://bugzilla.suse.com/show_bug.cgi?id=1257841
- https://bugzilla.suse.com/show_bug.cgi?id=1257897
- https://jira.suse.com/browse/MSQA-1045
- https://jira.suse.com/browse/PED-13824