BIT-prometheus-2026-42154

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/prometheus/BIT-prometheus-2026-42154.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-prometheus-2026-42154
Aliases
Published
2026-05-06T08:50:03.007Z
Modified
2026-05-06T09:56:07.125546288Z
Summary
Prometheus: remote read endpoint allows denial of service via crafted snappy payload
Details

Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the remote read endpoint (/api/v1/read) does not validate the declared decoded length in a snappy-compressed request body before allocating memory. An unauthenticated attacker can send a small payload that causes a huge heap allocation per request. Under concurrent load this can exhaust available memory and crash the Prometheus process. This issue has been patched in versions 3.5.3 and 3.11.3.

Database specific
{
    "severity": "High",
    "cpes": [
        "cpe:2.3:a:prometheus:prometheus:*:*:*:*:*:go:*:*"
    ]
}
References

Affected packages

Bitnami / prometheus

Package

Name
prometheus
Purl
pkg:bitnami/prometheus

Severity

  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.3
Introduced
3.6.0
Fixed
3.11.3

Database specific

source
"https://github.com/bitnami/vulndb/tree/main/data/prometheus/BIT-prometheus-2026-42154.json"