Debian Package Tracker
Register | Log in
Subscribe

prometheus

monitoring system and time series database

Choose email to subscribe with

general
  • source: prometheus (main)
  • version: 2.53.5+ds1-4
  • maintainer: Debian Go Packaging Team (DMD)
  • uploaders: Lucas Kanashiro [DMD] – Martina Ferrari [DMD] – Daniel Swarbrick [DMD]
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.24.1+ds-1
  • oldstable: 2.42.0+ds-5
  • stable: 2.53.3+ds1-2
  • testing: 2.53.5+ds1-4
  • unstable: 2.53.5+ds1-4
versioned links
  • 2.24.1+ds-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.42.0+ds-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.53.3+ds1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.53.5+ds1-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • golang-github-prometheus-prometheus-dev
  • prometheus (7 bugs: 0, 5, 2, 0)
  • promtool
action needed
Marked for autoremoval on 21 June due to docker.io: #1135999, #1136031 high
Version 2.53.5+ds1-4 of prometheus is marked for autoremoval from testing on Sun 21 Jun 2026. It is affected by #1135999. The removal of prometheus will also cause the removal of (transitive) reverse dependency: prometheus-pushgateway. It depends (transitively) on docker.io, affected by #1136031. You should try to prevent the removal by fixing these RC bugs.
Created: 2026-05-15 Last update: 2026-05-22 10:01
A new upstream version is available: 3.12.0-rc.0 high
A new upstream version 3.12.0-rc.0 is available, you should consider packaging it.
Created: 2025-11-27 Last update: 2026-05-22 07:02
2 security issues in trixie high

There are 2 open security issues in trixie.

2 important issues:
  • CVE-2026-42151: Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the client_secret field in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed as string instead of Secret. Prometheus redacts fields of type Secret when serving the configuration via the /-/config HTTP API endpoint. Because the field was a plain string, the Azure OAuth client secret was exposed in plaintext to any user or process with access to that endpoint. This issue has been patched in versions 3.5.3 and 3.11.3.
  • CVE-2026-42154: Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the remote read endpoint (/api/v1/read) does not validate the declared decoded length in a snappy-compressed request body before allocating memory. An unauthenticated attacker can send a small payload that causes a huge heap allocation per request. Under concurrent load this can exhaust available memory and crash the Prometheus process. This issue has been patched in versions 3.5.3 and 3.11.3.
Created: 2026-05-06 Last update: 2026-05-08 17:30
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2026-42151: Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the client_secret field in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed as string instead of Secret. Prometheus redacts fields of type Secret when serving the configuration via the /-/config HTTP API endpoint. Because the field was a plain string, the Azure OAuth client secret was exposed in plaintext to any user or process with access to that endpoint. This issue has been patched in versions 3.5.3 and 3.11.3.
  • CVE-2026-42154: Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the remote read endpoint (/api/v1/read) does not validate the declared decoded length in a snappy-compressed request body before allocating memory. An unauthenticated attacker can send a small payload that causes a huge heap allocation per request. Under concurrent load this can exhaust available memory and crash the Prometheus process. This issue has been patched in versions 3.5.3 and 3.11.3.
Created: 2026-05-06 Last update: 2026-05-08 17:30
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2026-42151: Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the client_secret field in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed as string instead of Secret. Prometheus redacts fields of type Secret when serving the configuration via the /-/config HTTP API endpoint. Because the field was a plain string, the Azure OAuth client secret was exposed in plaintext to any user or process with access to that endpoint. This issue has been patched in versions 3.5.3 and 3.11.3.
  • CVE-2026-42154: Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the remote read endpoint (/api/v1/read) does not validate the declared decoded length in a snappy-compressed request body before allocating memory. An unauthenticated attacker can send a small payload that causes a huge heap allocation per request. Under concurrent load this can exhaust available memory and crash the Prometheus process. This issue has been patched in versions 3.5.3 and 3.11.3.
Created: 2026-05-06 Last update: 2026-05-08 17:30
2 security issues in bullseye high

There are 2 open security issues in bullseye.

2 important issues:
  • CVE-2026-42151: Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the client_secret field in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed as string instead of Secret. Prometheus redacts fields of type Secret when serving the configuration via the /-/config HTTP API endpoint. Because the field was a plain string, the Azure OAuth client secret was exposed in plaintext to any user or process with access to that endpoint. This issue has been patched in versions 3.5.3 and 3.11.3.
  • CVE-2026-42154: Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the remote read endpoint (/api/v1/read) does not validate the declared decoded length in a snappy-compressed request body before allocating memory. An unauthenticated attacker can send a small payload that causes a huge heap allocation per request. Under concurrent load this can exhaust available memory and crash the Prometheus process. This issue has been patched in versions 3.5.3 and 3.11.3.
Created: 2026-05-06 Last update: 2026-05-08 17:30
2 security issues in bookworm high

There are 2 open security issues in bookworm.

2 important issues:
  • CVE-2026-42151: Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the client_secret field in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed as string instead of Secret. Prometheus redacts fields of type Secret when serving the configuration via the /-/config HTTP API endpoint. Because the field was a plain string, the Azure OAuth client secret was exposed in plaintext to any user or process with access to that endpoint. This issue has been patched in versions 3.5.3 and 3.11.3.
  • CVE-2026-42154: Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the remote read endpoint (/api/v1/read) does not validate the declared decoded length in a snappy-compressed request body before allocating memory. An unauthenticated attacker can send a small payload that causes a huge heap allocation per request. Under concurrent load this can exhaust available memory and crash the Prometheus process. This issue has been patched in versions 3.5.3 and 3.11.3.
Created: 2026-05-06 Last update: 2026-05-08 17:30
8 new commits since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit e8372479055b97c880e02708c2debfc497f974c4
Author: Guillem Jover <gjover@sipwise.com>
Date:   Thu May 21 18:53:36 2026 +0200

    Switch debian/gitlab-ci.yml to debian/salsa-ci.yml

commit 588e2d457ae4a847cf6f0119d26febb01d40296f
Author: Guillem Jover <gjover@sipwise.com>
Date:   Tue May 19 00:14:50 2026 +0200

    Revert "Remove --buildsystem=golang implicit since dh 13.4"
    
    This reverts commit be78b9aeb1bde5937859df0ebfa754c143f553be.
    
    The source tree contains a Makefile, which has precedence over the
    golang sequence, and wins the detection. The upstream build system then
    proceeds to try to downloading stuff from the network, and rely on other
    missing tools, all of which we do not want.

commit be78b9aeb1bde5937859df0ebfa754c143f553be
Author: Guillem Jover <gjover@sipwise.com>
Date:   Wed May 13 20:15:30 2026 +0200

    Remove --buildsystem=golang implicit since dh 13.4

commit 07bdb55b1548fcdccdbe2a805e6b68160348406e
Author: Guillem Jover <gjover@sipwise.com>
Date:   Wed May 13 19:33:27 2026 +0200

    Run wrap-and-sort -ast
    
    This is the only format that guarantees minimal diff deltas on
    modifications, as it avoids modifying unrelated lines even when
    shuffling content around fields or renaming fields.
    
    It also matches the new field placement by the dh-make-golang template.

commit ad758e51c04b87a7c02a620f76fcbeff57b6774d
Author: Guillem Jover <gjover@sipwise.com>
Date:   Wed May 13 00:41:28 2026 +0200

    Switch to debian/watch format version 5

commit 82867a0a0dd394cab74bdd2889fa956cc0337446
Author: Guillem Jover <gjover@sipwise.com>
Date:   Wed May 13 00:37:52 2026 +0200

    Bump Standards-Version to 4.7.4

commit 89d2f31fbc2809551d05b159bc8be1196db6ab4c
Author: Guillem Jover <gjover@sipwise.com>
Date:   Wed May 13 00:34:55 2026 +0200

    Remove «Priority: optional», which is now the default

commit ee902fb56afd8a9344930dd2f5a2bf5096086fc9
Author: Guillem Jover <gjover@sipwise.com>
Date:   Wed May 13 00:31:23 2026 +0200

    Remove «Rules-Requires-Root: no», which is now the default
Created: 2026-05-15 Last update: 2026-05-21 19:18
1 open merge request in Salsa normal
There is 1 open merge request for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2026-05-15 Last update: 2026-05-15 21:00
lintian reports 2 warnings normal
Lintian reports 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-01-01 Last update: 2026-01-01 07:00
debian/patches: 4 patches to forward upstream low

Among the 22 debian patches available in version 2.53.5+ds1-4 of the package, we noticed the following issues:

  • 4 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2024-03-18 Last update: 2026-03-26 21:31
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.2).
Created: 2025-12-23 Last update: 2026-03-31 15:01
news
[rss feed]
  • [2026-03-29] prometheus 2.53.5+ds1-4 MIGRATED to testing (Debian testing watch)
  • [2026-03-26] Accepted prometheus 2.53.5+ds1-4 (source) into unstable (Reinhard Tartler)
  • [2026-01-05] prometheus 2.53.5+ds1-3 MIGRATED to testing (Debian testing watch)
  • [2025-12-31] Accepted prometheus 2.53.5+ds1-3 (source) into unstable (Daniel Swarbrick)
  • [2025-09-30] prometheus 2.53.5+ds1-2 MIGRATED to testing (Debian testing watch)
  • [2025-09-27] Accepted prometheus 2.53.5+ds1-2 (source) into unstable (Arthur Diniz)
  • [2025-08-23] prometheus 2.53.5+ds1-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-20] Accepted prometheus 2.53.5+ds1-1 (source) into unstable (Daniel Swarbrick)
  • [2025-08-19] Accepted prometheus 2.53.4+ds1-1 (source) into unstable (Daniel Swarbrick)
  • [2025-07-15] prometheus 2.53.3+ds1-2 MIGRATED to testing (Debian testing watch)
  • [2025-06-23] Accepted prometheus 2.53.3+ds1-2 (source) into unstable (Daniel Swarbrick)
  • [2025-02-21] prometheus 2.53.3+ds1-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-16] Accepted prometheus 2.53.3+ds1-1 (source) into unstable (Martina Ferrari)
  • [2025-02-16] prometheus 2.53.1+ds-3 MIGRATED to testing (Debian testing watch)
  • [2025-02-14] Accepted prometheus 2.53.1+ds-3 (source) into unstable (Martina Ferrari)
  • [2025-02-10] Accepted prometheus 2.53.1+ds-2 (source) into unstable (Martina Ferrari)
  • [2025-02-10] Accepted prometheus 2.53.1+ds-1 (source) into unstable (Martina Ferrari)
  • [2024-12-11] prometheus 2.45.6+ds-9 MIGRATED to testing (Debian testing watch)
  • [2024-12-05] Accepted prometheus 2.45.6+ds-9 (source) into unstable (Daniel Swarbrick)
  • [2024-12-02] Accepted prometheus 2.45.6+ds-8 (source all amd64) into unstable (Debian FTP Masters) (signed by: Daniel Swarbrick)
  • [2024-11-06] prometheus 2.45.6+ds-7 MIGRATED to testing (Debian testing watch)
  • [2024-10-31] Accepted prometheus 2.45.6+ds-7 (source) into unstable (Reinhard Tartler)
  • [2024-10-22] Accepted prometheus 2.45.6+ds-6 (source) into experimental (Reinhard Tartler)
  • [2024-10-13] prometheus 2.45.6+ds-5 MIGRATED to testing (Debian testing watch)
  • [2024-10-07] Accepted prometheus 2.45.6+ds-5 (source) into unstable (Daniel Swarbrick)
  • [2024-10-06] Accepted prometheus 2.45.6+ds-4 (source) into unstable (Daniel Swarbrick)
  • [2024-10-05] Accepted prometheus 2.45.6+ds-3 (source all amd64) into unstable (Debian FTP Masters) (signed by: Daniel Swarbrick)
  • [2024-09-28] prometheus 2.45.6+ds-2 MIGRATED to testing (Debian testing watch)
  • [2024-09-23] Accepted prometheus 2.45.6+ds-2 (source) into unstable (Daniel Swarbrick)
  • [2024-08-07] prometheus 2.45.6+ds-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 9 10
  • RC: 2
  • I&N: 5 6
  • M&W: 2
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 2)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.53.5+ds1-3
  • 4 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing