{"affected":[{"ecosystem_specific":{"binaries":[{"firewalld-prometheus-config":"0.1-150000.3.44.1","golang-github-prometheus-prometheus":"2.32.1-150000.3.44.1"}]},"package":{"ecosystem":"SUSE:Manager Client Tools 15","name":"golang-github-prometheus-prometheus","purl":"pkg:rpm/suse/golang-github-prometheus-prometheus&distro=SUSE%20Manager%20Client%20Tools%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.32.1-150000.3.44.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for golang-github-prometheus-prometheus fixes the following issues:\n\n- CVE-2022-46146: Fixed authentication bypass via cache poisoning in Prometheus Exporter Toolkit (bsc#1208049).\n","id":"SUSE-SU-2023:1857-1","modified":"2023-04-14T14:44:28Z","published":"2023-04-14T14:44:28Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20231857-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1208049"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-46146"}],"related":["CVE-2022-46146"],"summary":"Security update for golang-github-prometheus-prometheus","upstream":["CVE-2022-46146"]}