Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the remote read endpoint (/api/v1/read) does not validate the declared decoded length in a snappy-compressed request body before allocating memory. An unauthenticated attacker can send a small payload that causes a huge heap allocation per request. Under concurrent load this can exhaust available memory and crash the Prometheus process. This issue has been patched in versions 3.5.3 and 3.11.3.
Metrics
Affected Vendors & Products
References
History
Mon, 04 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Prometheus
Prometheus prometheus |
|
| Vendors & Products |
Prometheus
Prometheus prometheus |
Mon, 04 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the remote read endpoint (/api/v1/read) does not validate the declared decoded length in a snappy-compressed request body before allocating memory. An unauthenticated attacker can send a small payload that causes a huge heap allocation per request. Under concurrent load this can exhaust available memory and crash the Prometheus process. This issue has been patched in versions 3.5.3 and 3.11.3. | |
| Title | Prometheus: remote read endpoint allows denial of service via crafted snappy payload | |
| Weaknesses | CWE-400 CWE-789 |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-04T20:19:13.876Z
Reserved: 2026-04-24T17:15:21.835Z
Link: CVE-2026-42154
Updated: 2026-05-04T20:18:51.965Z
Status : Received
Published: 2026-05-04T19:16:04.397
Modified: 2026-05-04T19:16:04.397
Link: CVE-2026-42154
No data.
OpenCVE Enrichment
Updated: 2026-05-04T20:30:08Z