<div class="container">
    <h1>Security update for golang-github-prometheus-prometheus</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2024:3288-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204023">bsc#1204023</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208298">bsc#1208298</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227038">bsc#1227038</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228556">bsc#1228556</a>
                        </li>
                    
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/MSQA-848">jsc#MSQA-848</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-3577">jsc#PED-3577</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-5406">jsc#PED-5406</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-41715.html">CVE-2022-41715</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-41723.html">CVE-2022-41723</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-45142.html">CVE-2023-45142</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-6104.html">CVE-2024-6104</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-41715</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-41715</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-41723</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-41723</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-45142</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-45142</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-6104</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-6104</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">openSUSE Leap 15.5</li>
                    
                        <li class="list-group-item">openSUSE Leap 15.6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Manager Proxy 4.3</li>
                    
                        <li class="list-group-item">SUSE Manager Proxy 4.3 Module 4.3</li>
                    
                        <li class="list-group-item">SUSE Manager Retail Branch Server 4.3</li>
                    
                        <li class="list-group-item">SUSE Package Hub 15 15-SP5</li>
                    
                        <li class="list-group-item">SUSE Package Hub 15 15-SP6</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves four vulnerabilities and contains three features can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update for golang-github-prometheus-prometheus fixes the following issues:</p>
<ul>
<li>
<p>Require Go > 1.20 for building</p>
</li>
<li>
<p>Bump go-retryablehttp to version 0.7.7
  (CVE-2024-6104, bsc#1227038)</p>
</li>
<li>Migrate from <code>disabled</code> to <code>manual</code> service mode</li>
<li>Add0003-Bump-go-retryablehttp.patch</li>
<li>Update to 2.45.6 (jsc#PED-3577):</li>
<li>Security fixes in dependencies</li>
<li>Update to 2.45.5:</li>
<li>[BUGFIX] tsdb/agent: ensure that new series get written to WAL
    on rollback.</li>
<li>[BUGFIX] Remote write: Avoid a race condition when applying
    configuration.</li>
<li>Update to 2.45.4:</li>
<li>[BUGFIX] Remote read: Release querier resources before encoding
    the results.</li>
<li>Update to 2.45.3:</li>
<li>Security fixes in dependencies</li>
<li>[BUGFIX] TSDB: Remove double memory snapshot on shutdown.</li>
<li>Update to 2.45.2:</li>
<li>Security fixes in dependencies</li>
<li>[SECURITY] Updated otelhttp to version 0.46.1
    (CVE-2023-45142, bsc#1228556)</li>
<li>[BUGFIX] TSDB: Fix PostingsForMatchers race with creating new
    series.</li>
<li>Update to 2.45.1:</li>
<li>[ENHANCEMENT] Hetzner SD: Support larger ID&#x27;s that will be used
    by Hetzner in September.</li>
<li>[BUGFIX] Linode SD: Cast InstanceSpec values to int64 to avoid
    overflows on 386 architecture.</li>
<li>
<p>[BUGFIX] TSDB: Handle TOC parsing failures.</p>
</li>
<li>
<p>update to 2.45.0 (jsc#PED-5406):</p>
</li>
<li>[FEATURE] API: New limit parameter to limit the number of items
    returned by <code>/api/v1/status/tsdb</code> endpoint. </li>
<li>[FEATURE] Config: Add limits to global config. </li>
<li>[FEATURE] Consul SD: Added support for <code>path_prefix</code>. </li>
<li>[FEATURE] Native histograms: Add option to scrape both classic
    and native histograms. </li>
<li>[FEATURE] Native histograms: Added support for two more
    arithmetic operators <code>avg_over_time</code> and <code>sum_over_time</code>.</li>
<li>[FEATURE] Promtool: When providing the block id, only one block
    will be loaded and analyzed. </li>
<li>[FEATURE] Remote-write: New Azure ad configuration to support
    remote writing directly to Azure Monitor workspace. </li>
<li>[FEATURE] TSDB: Samples per chunk are now configurable with
    flag <code>storage.tsdb.samples-per-chunk</code>. By default set to its
    former value 120. </li>
<li>[ENHANCEMENT] Native histograms: bucket size can now be limited
    to avoid scrape fails. </li>
<li>[ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL
    sooner. </li>
<li>[BUGFIX] Native histograms: ChunkSeries iterator now checks if
    a new sample can be appended to the open chunk. </li>
<li>[BUGFIX] Native histograms: Fix Histogram Appender
    <code>Appendable()</code> segfault. </li>
<li>[BUGFIX] Native histograms: Fix setting reset header to gauge
    histograms in seriesToChunkEncoder. </li>
<li>[BUGFIX] TSDB: Tombstone intervals are not modified after Get()
    call. </li>
<li>[BUGFIX] TSDB: Use path/filepath to set the WAL directory.</li>
<li>update to 2.44.0:</li>
<li>[FEATURE] Remote-read: Handle native histograms. </li>
<li>[FEATURE] Promtool: Health and readiness check of prometheus
    server in CLI. </li>
<li>[FEATURE] PromQL: Add <code>query_samples_total</code> metric, the total
    number of samples loaded by all queries.</li>
<li>[ENHANCEMENT] Storage: Optimise buffer used to iterate through
    samples.</li>
<li>[ENHANCEMENT] Scrape: Reduce memory allocations on target
    labels.</li>
<li>[ENHANCEMENT] PromQL: Use faster heap method for <code>topk()</code> /
    <code>bottomk()</code>.</li>
<li>[ENHANCEMENT] Rules API: Allow filtering by rule name.</li>
<li>[ENHANCEMENT] Native Histograms: Various fixes and
    improvements.</li>
<li>[ENHANCEMENT] UI: Search of scraping pools is now
    case-insensitive.</li>
<li>[ENHANCEMENT] TSDB: Add an affirmative log message for
    successful WAL repair.</li>
<li>[BUGFIX] TSDB: Block compaction failed when shutting down.</li>
<li>[BUGFIX] TSDB: Out-of-order chunks could be ignored if the
    write-behind log was deleted.</li>
<li>rebase patch 0001-Do-not-force-the-pure-Go-name-resolver.patch
  onto v2.44.0</li>
<li>update to 2.43.1</li>
<li>[BUGFIX] Labels: Set() after Del() would be ignored, which
    broke some relabeling rules.</li>
<li>update to 2.43.0:</li>
<li>[FEATURE] Promtool: Add HTTP client configuration to query
    commands.</li>
<li>[FEATURE] Scrape: Add <code>include_scrape_configs</code> to include
    scrape configs from different files.</li>
<li>[FEATURE] HTTP client: Add <code>no_proxy</code> to exclude URLs from
    proxied requests.</li>
<li>[FEATURE] HTTP client: Add <code>proxy_from_enviroment</code> to read
    proxies from env variables.</li>
<li>[ENHANCEMENT] API: Add support for setting lookback delta per
    query via the API.</li>
<li>[ENHANCEMENT] API: Change HTTP status code from 503/422 to 499
    if a request is canceled.</li>
<li>[ENHANCEMENT] Scrape: Allow exemplars for all metric types.</li>
<li>[ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders
    size.</li>
<li>[ENHANCEMENT] TSDB: Automatically remove incorrect snapshot
    with index that is ahead of WAL.</li>
<li>[ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to
    be more comprehensible.</li>
<li>[ENHANCEMENT] UI: Scope <code>group by</code> labels to metric in
    autocompletion.</li>
<li>[BUGFIX] Scrape: Fix
    <code>prometheus_target_scrape_pool_target_limit</code> metric not set
    before reloading.</li>
<li>[BUGFIX] TSDB: Correctly update
    <code>prometheus_tsdb_head_chunks_removed_total</code> and
    <code>prometheus_tsdb_head_chunks</code> metrics when reading WAL.</li>
<li>[BUGFIX] TSDB: Use the correct unit (seconds) when recording
    out-of-order append deltas in the
    <code>prometheus_tsdb_sample_ooo_delta</code> metric.</li>
<li>update to 2.42.0:
  This release comes with a bunch of feature coverage for native
  histograms and breaking changes.
  If you are trying native histograms already, we recommend you
  remove the <code>wal</code> directory when upgrading.
  Because the old WAL record for native histograms is not
  backward compatible in v2.42.0, this will lead to some data
  loss for the latest data.
  Additionally, if you scrape "float histograms" or use recording
  rules on native histograms in v2.42.0 (which writes float
  histograms), it is a one-way street since older versions do not
  support float histograms.</li>
<li>[CHANGE] <strong>breaking</strong> TSDB: Changed WAL record format for the
    experimental native histograms.</li>
<li>[FEATURE] Add &#x27;keep_firing_for&#x27; field to alerting rules.</li>
<li>[FEATURE] Promtool: Add support of selecting timeseries for
    TSDB dump.</li>
<li>[ENHANCEMENT] Agent: Native histogram support.</li>
<li>[ENHANCEMENT] Rules: Support native histograms in recording
    rules.</li>
<li>[ENHANCEMENT] SD: Add container ID as a meta label for pod
    targets for Kubernetes.</li>
<li>[ENHANCEMENT] SD: Add VM size label to azure service
    discovery.</li>
<li>[ENHANCEMENT] Support native histograms in federation.</li>
<li>[ENHANCEMENT] TSDB: Add gauge histogram support.</li>
<li>[ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that
    represents buckets as float64 values.</li>
<li>[ENHANCEMENT] UI: Show individual scrape pools on /targets
    page.</li>
<li>update to 2.41.0:</li>
<li>[FEATURE] Relabeling: Add keepequal and dropequal relabel
    actions.</li>
<li>[FEATURE] Add support for HTTP proxy headers. </li>
<li>[ENHANCEMENT] Reload private certificates when changed on disk.</li>
<li>[ENHANCEMENT] Add max_version to specify maximum TLS version in
    tls_config.</li>
<li>[ENHANCEMENT] Add goos and goarch labels to
    prometheus_build_info.</li>
<li>[ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs.</li>
<li>[ENHANCEMENT] SD: Add new metric
    prometheus_sd_file_watcher_errors_total.</li>
<li>[ENHANCEMENT] Remote Read: Use a pool to speed up marshalling.</li>
<li>[ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in
    iterators.</li>
<li>[ENHANCEMENT] TSDB: Optimize postings offset table reading.</li>
<li>[BUGFIX] Scrape: Validate the metric name, label names, and
    label values after relabeling.</li>
<li>[BUGFIX] Remote Write receiver and rule manager: Fix error
    handling.</li>
<li>update to 2.40.7:</li>
<li>[BUGFIX] TSDB: Fix queries involving negative buckets of native
    histograms.</li>
<li>update to 2.40.5:</li>
<li>[BUGFIX] TSDB: Fix queries involving native histograms due to
    improper reset of iterators.</li>
<li>update to 2.40.3:</li>
<li>[BUGFIX] TSDB: Fix compaction after a deletion is called.</li>
<li>update to 2.40.2:</li>
<li>[BUGFIX] UI: Fix black-on-black metric name color in dark mode.</li>
<li>update to 2.40.1:</li>
<li>[BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit
    architecture.</li>
<li>[BUGFIX] Scrape: Fix accept headers.</li>
<li>update to 2.40.0:</li>
<li>[FEATURE] Add experimental support for native histograms.
    Enable with the flag --enable-feature=native-histograms.</li>
<li>[FEATURE] SD: Add service discovery for OVHcloud.</li>
<li>[ENHANCEMENT] Kubernetes SD: Use protobuf encoding.</li>
<li>[ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved
    sorting speed.</li>
<li>[ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds
    __meta_consul_partition label. Adds partition config in
    consul_sd_config.</li>
<li>[BUGFIX] API: Fix API error codes for /api/v1/labels and
    /api/v1/series.</li>
<li>update to 2.39.1:</li>
<li>[BUGFIX] Rules: Fix notifier relabel changing the labels on
    active alerts.</li>
<li>update to 2.39.0:</li>
<li>[FEATURE] experimental TSDB: Add support for ingesting
    out-of-order samples. This is configured via
    out_of_order_time_window field in the config file; check config
    file docs for more info.</li>
<li>[ENHANCEMENT] API: /-/healthy and /-/ready API calls now also
    respond to a HEAD request on top of existing GET support.</li>
<li>[ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label.</li>
<li>[ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label.</li>
<li>[ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region
    label.</li>
<li>[ENHANCEMENT] Scrape: Optimise relabeling by re-using memory.</li>
<li>[ENHANCEMENT] TSDB: Improve WAL replay timings.</li>
<li>[ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary
    data in the memory.</li>
<li>[ENHANCEMENT] TSDB: Allow overlapping blocks by default.
    --storage.tsdb.allow-overlapping-blocks now has no effect.</li>
<li>[ENHANCEMENT] UI: Click to copy label-value pair from query
    result to clipboard.</li>
<li>[BUGFIX] TSDB: Turn off isolation for Head compaction to fix a
    memory leak.</li>
<li>[BUGFIX] TSDB: Fix &#x27;invalid magic number 0&#x27; error on Prometheus
    startup.</li>
<li>[BUGFIX] PromQL: Properly close file descriptor when logging
    unfinished queries.</li>
<li>[BUGFIX] Agent: Fix validation of flag options and prevent WAL
    from growing more than desired.</li>
<li>update to 2.38.0:</li>
<li>[FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint
    that allows pretty-formatting PromQL expressions.</li>
<li>[FEATURE]: UI: Add support for formatting PromQL expressions in
    the UI.</li>
<li>[FEATURE]: DNS SD: Support MX records for discovering targets.</li>
<li>[FEATURE]: Templates: Add toTime() template function that
    allows converting sample timestamps to Go time.Time values.</li>
<li>[ENHANCEMENT]: Kubernetes SD: Add
    __meta_kubernetes_service_port_number meta label indicating the
    service port number.</li>
<li>[ENHANCEMENT]: Kubernetes SD: Add
    __meta_kubernetes_pod_container_image meta label indicating the
    container image.</li>
<li>[ENHANCEMENT]: PromQL: When a query panics, also log the query
    itself alongside the panic message.</li>
<li>[ENHANCEMENT]: UI: Tweak colors in the dark theme to improve
    the contrast ratio.</li>
<li>[ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding
    locks and using atomic types instead.</li>
<li>[ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature
    flag, which omits or removes any default HTTP (:80) or HTTPS
    (:443) ports in the target&#x27;s scrape address.</li>
<li>[BUGFIX]: TSDB: In the WAL watcher metrics, expose the
    type="exemplar" label instead of type="unknown" for exemplar
    records.</li>
<li>
<p>[BUGFIX]: TSDB: Fix race condition around allocating series IDs
    during chunk snapshot loading.</p>
</li>
<li>
<p>Remove npm_licenses.tar.bz2 during "make clean"</p>
</li>
<li>
<p>Remove web-ui archives during "make clean".</p>
</li>
<li>
<p>[SECURITY] CVE-2022-41715: Limit memory used by parsing regexps
    (bsc#1204023).</p>
</li>
<li>Fix uncontrolled resource consumption by updating Go to version
  1.20.1 (CVE-2022-41723, bsc#1208298)</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                openSUSE Leap 15.5
                
                    
                        <br/>
                        <code>zypper in -t patch openSUSE-SLE-15.5-2024-3288=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                openSUSE Leap 15.6
                
                    
                        <br/>
                        <code>zypper in -t patch openSUSE-SLE-15.6-2024-3288=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Package Hub 15 15-SP5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3288=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Package Hub 15 15-SP6
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3288=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Manager Proxy 4.3 Module 4.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-3288=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>golang-github-prometheus-prometheus-2.45.6-150100.4.20.1</li>
                        
                            <li>firewalld-prometheus-config-0.1-150100.4.20.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>golang-github-prometheus-prometheus-2.45.6-150100.4.20.1</li>
                        
                            <li>firewalld-prometheus-config-0.1-150100.4.20.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>golang-github-prometheus-prometheus-2.45.6-150100.4.20.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>golang-github-prometheus-prometheus-2.45.6-150100.4.20.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>golang-github-prometheus-prometheus-2.45.6-150100.4.20.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-41715.html">https://www.suse.com/security/cve/CVE-2022-41715.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-41723.html">https://www.suse.com/security/cve/CVE-2022-41723.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-45142.html">https://www.suse.com/security/cve/CVE-2023-45142.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-6104.html">https://www.suse.com/security/cve/CVE-2024-6104.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204023">https://bugzilla.suse.com/show_bug.cgi?id=1204023</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208298">https://bugzilla.suse.com/show_bug.cgi?id=1208298</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227038">https://bugzilla.suse.com/show_bug.cgi?id=1227038</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228556">https://bugzilla.suse.com/show_bug.cgi?id=1228556</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/MSQA-848">https://jira.suse.com/browse/MSQA-848</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-3577">https://jira.suse.com/browse/PED-3577</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-5406">https://jira.suse.com/browse/PED-5406</a>
                    </li>
                
            
        </ul>
    
</div>