First published: Tue Jan 25 2022(Updated: )
A denial of service attack was found in prometheus/client_golang. This flaw allows an attacker to produce a denial of service attack on an HTTP server by exploiting the InstrumentHandlerCounter function in the version below 1.11.1, resulting in a loss of availability.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:1.3.1-4.el8 | 0:1.3.1-4.el8 |
redhat/grafana | <0:7.5.15-3.el8 | 0:7.5.15-3.el8 |
redhat/grafana | <0:7.5.15-3.el9 | 0:7.5.15-3.el9 |
redhat/atomic-openshift-dockerregistry | <0:3.11.705-1.g0fa231c.el7 | 0:3.11.705-1.g0fa231c.el7 |
redhat/buildah | <1:1.23.4-2.el8 | 1:1.23.4-2.el8 |
redhat/openshift-clients | <0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8 | 0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8 |
redhat/etcd | <0:3.3.23-10.el8 | 0:3.3.23-10.el8 |
redhat/kubevirt | <0:4.10.1-489.el7 | 0:4.10.1-489.el7 |
redhat/kubevirt | <0:4.10.1-489.el8 | 0:4.10.1-489.el8 |
Prometheus Client Golang | <1.11.1 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Extra Packages For Enterprise Linux | =7.0 | |
Fedoraproject Extra Packages For Enterprise Linux | =8.0 | |
Rdo Project Rdo | ||
Fedoraproject Fedora | =37 | |
go/github.com/prometheus/client_golang | <1.11.1 | 1.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2022-21698.
The severity of CVE-2022-21698 is high, with a severity value of 7.5.
The affected software includes Prometheus Client Golang version up to 1.11.1, Fedoraproject Fedora versions 34-37, Fedoraproject Extra Packages For Enterprise Linux versions 7.0 and 8.0, and Rdo Project Rdo.
CVE-2022-21698 is a denial of service attack vulnerability in the prometheus/client_golang library for Go applications.
To fix CVE-2022-21698, it is recommended to upgrade to a fixed version of Prometheus Client Golang or to apply the relevant security patches provided by the software vendor.