{"id":"MGASA-2022-0180","summary":"Updated golang-github-prometheus-client packages fix security vulnerability","details":"HTTP server is susceptible to a Denial of Service through unbounded\ncardinality, and potential memory exhaustion, when handling requests with\nnon-standard HTTP methods.\n","modified":"2026-01-31T11:28:10.371285Z","published":"2022-05-15T10:06:40Z","related":["CVE-2022-21698"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0180.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=30054"},{"type":"REPORT","url":"https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FY3N7H6VSDZM37B4SKM2PFFCUWU7QYWN/"},{"type":"REPORT","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DCH7WCUVWWLVX6ITJIZWAVCPF7EKZ2D6/"}],"affected":[{"package":{"name":"golang-github-prometheus-client","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/golang-github-prometheus-client?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.11.1-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0180.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}