No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Prometheus
Prometheus prometheus |
|
| Vendors & Products |
Prometheus
Prometheus prometheus |
Mon, 04 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the remote read endpoint (/api/v1/read) does not validate the declared decoded length in a snappy-compressed request body before allocating memory. An unauthenticated attacker can send a small payload that causes a huge heap allocation per request. Under concurrent load this can exhaust available memory and crash the Prometheus process. This issue has been patched in versions 3.5.3 and 3.11.3. | |
| Title | Prometheus: remote read endpoint allows denial of service via crafted snappy payload | |
| Weaknesses | CWE-400 CWE-789 |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-04T20:19:13.876Z
Reserved: 2026-04-24T17:15:21.835Z
Link: CVE-2026-42154
Updated: 2026-05-04T20:18:51.965Z
Status : Received
Published: 2026-05-04T19:16:04.397
Modified: 2026-05-04T19:16:04.397
Link: CVE-2026-42154
No data.
OpenCVE Enrichment
Updated: 2026-05-04T20:30:08Z