@@ -27,23 +27,51 @@ After PR #436 upgraded Prometheus from `v3.5.0` to `v3.5.1`:
2727
2828## Steps
2929
30- - [ ] Check the latest Prometheus release:
30+ - [x ] Check the latest Prometheus release:
3131 < https://hub.docker.com/r/prom/prometheus/tags >
32- - [ ] Run Trivy against candidate newer tags:
32+ - [x ] Run Trivy against candidate newer tags:
3333 ` trivy image --severity HIGH,CRITICAL prom/prometheus:LATEST_TAG `
34- - [ ] Compare results against the v3.5.1 baseline in
34+ - [x ] Compare results against the v3.5.1 baseline in
3535 ` docs/security/docker/scans/prometheus.md `
36- - [ ] ** If CRITICALs are cleared** : update ` src/domain/prometheus/config.rs ` and
36+ - [x ] ** If CRITICALs are cleared** : update ` src/domain/prometheus/config.rs ` and
3737 the CI scan matrix; update the scan doc; post results comment; close #433
3838- [ ] ** If CRITICALs remain** : post comment documenting which CVEs remain and why
3939 they cannot be fixed (upstream binary); add revisit note to #433 ; leave open
4040
4141## Outcome
4242
43- <!-- Fill in after doing the work -->
43+ - Date: 2026-04-14
44+ - Latest Prometheus tag tested: ` v3.11.2 ` (released 2026-04-13)
45+ - Decision: ** upgrade to ` prom/prometheus:v3.11.2 ` ** — all CRITICALs eliminated
46+ - Action: updated ` src/domain/prometheus/config.rs ` ; updated scan doc; updated CI matrix comment
47+ - PR: opened against ` main ` on branch ` 433-prometheus-cves `
4448
45- - Date:
46- - Latest Prometheus tag tested:
47- - Findings (HIGH / CRITICAL):
48- - Decision: upgrade / accept risk / leave open
49- - Comment/PR:
49+ ### Scan details — ` prom/prometheus:v3.11.2 ` (Trivy, 2026-04-14)
50+
51+ ** Version comparison:**
52+
53+ | Version | HIGH | CRITICAL |
54+ | --------- | ---- | -------- |
55+ | ` v3.5.0 ` | 16 | 4 |
56+ | ` v3.5.1 ` | 6 | 2 |
57+ | ` v3.11.2 ` | 4 | 0 ✅ |
58+
59+ ** Target breakdown (` v3.11.2 ` ):**
60+
61+ | Target | HIGH | CRITICAL |
62+ | ---------------- | ---- | -------- |
63+ | ` bin/prometheus ` | 3 | 0 |
64+ | ` bin/promtool ` | 1 | 0 |
65+
66+ No OS layer — pure Go binaries, no Alpine/Debian base.
67+
68+ ** Remaining CVEs (all HIGH, no remote attack path):**
69+
70+ | CVE | Library | Installed | Fixed In | Notes |
71+ | -------------- | ---------------- | --------- | -------- | ----------------------------------------- |
72+ | CVE-2026 -32285 | buger/jsonparser | v1.1.1 | 1.1.2 | DoS via malformed JSON; internal use only |
73+ | CVE-2026 -34040 | moby/docker | v28.5.2 | 29.3.1 | Auth bypass; Docker-client code path |
74+ | CVE-2026 -39883 | otel/sdk | v1.42.0 | 1.43.0 | Local PATH hijack; no remote path |
75+
76+ ** Overall risk** : All 4 remaining findings are local-only. No remote attack path.
77+ Upgrade to v3.11.2 is the recommended action and was applied.
0 commit comments