Skip to content

fix(deps): update module github.com/prometheus/prometheus to v0.311.3 [security]#146

Open
renovate-sh-app[bot] wants to merge 1 commit intomainfrom
renovate/go-github.com-prometheus-prometheus-vulnerability
Open

fix(deps): update module github.com/prometheus/prometheus to v0.311.3 [security]#146
renovate-sh-app[bot] wants to merge 1 commit intomainfrom
renovate/go-github.com-prometheus-prometheus-vulnerability

Conversation

@renovate-sh-app
Copy link
Copy Markdown
Contributor

@renovate-sh-app renovate-sh-app Bot commented Apr 13, 2026

This PR contains the following updates:

Package Change Age Confidence
github.com/prometheus/prometheus v0.308.1v0.311.3 age confidence

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Prometheus has Stored XSS via metric names and label values in Prometheus web UI tooltips and metrics explorer

CVE-2026-40179 / GHSA-vffh-x6r8-xx99

More information

Details

Impact

Stored cross-site scripting (XSS) via crafted metric names in the Prometheus web UI:

  • Old React UI + New Mantine UI: When a user hovers over a chart tooltip on the Graph page, metric names containing HTML/JavaScript are injected into innerHTML without escaping, causing arbitrary script execution in the user's browser.
  • Old React UI only: When a user opens the Metric Explorer (globe icon next to the PromQL expression input field), and a metric name containing HTML/JavaScript is rendered in the fuzzy search results, it is injected into innerHTML without escaping, causing arbitrary script execution in the user's browser.
  • Old React UI only: When a user views a heatmap chart and hovers over a cell, the le label values of the underlying histogram buckets are interpolated into innerHTML without escaping. While le is conventionally a numeric bucket boundary, Prometheus does not enforce this — arbitrary UTF-8 strings are accepted as label values, allowing script injection via a crafted scrape target or remote write.

With Prometheus v3.x defaulting to UTF-8 metric and label name validation, characters like <, >, and " are now valid in metric names and labels, making this exploitable.

An attacker who can inject metrics (via a compromised scrape target, remote write, or OTLP receiver endpoint) can execute JavaScript in the browser of any Prometheus user who views the metric in the Graph UI. From the XSS context, an attacker could for example:

  • Read /api/v1/status/config to extract sensitive configuration (although credentials / secrets are redacted by the server)
  • Call /-/quit to shut down Prometheus (only if --web.enable-lifecycle is set)
  • Call /api/v1/admin/tsdb/delete_series to delete data (only if --web.enable-admin-api is set)
  • Exfiltrate metric data to an external server

Both the new Mantine UI and the old React UI are affected. The vulnerable code paths are:

  • web/ui/mantine-ui/src/pages/query/uPlotChartHelpers.ts — tooltip innerHTML with unescaped labels.__name__
  • web/ui/react-app/src/pages/graph/GraphHelpers.ts — tooltip content with unescaped labels.__name__
  • web/ui/react-app/src/pages/graph/MetricsExplorer.tsx — fuzzy search results rendered via dangerouslySetInnerHTML without sanitization
  • web/ui/react-app/src/vendor/flot/jquery.flot.heatmap.js — heatmap tooltip with unescaped label values
Patches

A patch has been published in Prometheus 3.5.2 LTS and Prometheus 3.11.2. The fix applies escapeHTML() to all user-controlled values (metric names and label values) before inserting them into innerHTML. This advisory will be updated with the patched version once released.

Workarounds
  • If using the remote write receiver (--web.enable-remote-write-receiver), ensure it is not exposed to untrusted sources.
  • If using the OTLP receiver (--web.enable-otlp-receiver), ensure it is not exposed to untrusted sources.
  • Ensure scrape targets are trusted and not under attacker control.
  • Do not enable admin / mutating API endpoints (e.g. --web.enable-admin-api or web.enable-lifecycle) in cases where you cannot prevent untrusted data from being ingested.
  • Users should avoid clicking untrusted links, especially those containing functions such as label_replace, as they may generate poisoned label names and values.
Acknowledgements

Thanks to @​gladiator9797 (Duc Anh Nguyen from TinyxLab) for reporting this.

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Prometheus Azure AD remote write OAuth client secret exposed via config API

CVE-2026-42151 / GHSA-wg65-39gg-5wfj

More information

Details

Impact

Users who use Azure AD remote write with OAuth authentication are impacted.

The client_secret field in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed as string instead of Secret. Prometheus redacts fields of type Secret when serving the configuration via the /-/config HTTP API endpoint. Because the field was a plain string, the Azure OAuth client secret was exposed in plaintext to any user or process with access to that endpoint.

Patches

The problem has been patched by changing ClientSecret in OAuthConfig to Secret. Users should upgrade to 3.11.3 or 3.5.3 LTS.

Workarounds

Users who can not upgrade can switch to Managed Identity or Workload Identity authentication for Azure AD remote write, which do not involve a client secret.

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Prometheus: Remote read endpoint allows denial of service via crafted snappy payload

CVE-2026-42154 / GHSA-8rm2-7qqf-34qm

More information

Details

Impact

The remote read endpoint (/api/v1/read) does not validate the declared decoded length in a snappy-compressed request body before allocating memory.
An unauthenticated attacker can send a small payload that causes a huge heap allocation per request. Under concurrent load this can exhaust available memory and crash the Prometheus process.

Patches

Has the problem been patched? What versions should users upgrade to?

Fixed in 3.11.3 and 3.5.3 LTS. Users should upgrade to these versions or later.

Workarounds

User who can not upgrade can place Prometheus behind a reverse proxy or firewall that requires authentication before requests reach /api/v1/read.

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Prometheus vulnerable to stored XSS via crafted histogram bucket label values in the old web UI heatmap display

GHSA-fw8g-cg8f-9j28

More information

Details

Impact

In the Prometheus server's legacy web UI (enabled via the command-line flag --enable-feature=old-ui), the histogram heatmap chart view does not escape le label values when inserting them into the HTML for use as axis tick mark labels.

An attacker who can inject crafted metrics (e.g. via a compromised scrape target, remote write, or OTLP receiver endpoint) can execute JavaScript in the browser of any Prometheus user who views the metric in the heatmap chart UI. From the XSS context, an attacker could for example:

  • Read /api/v1/status/config to extract sensitive configuration (although credentials / secrets are redacted by the server)
  • Call /-/quit to shut down Prometheus (only if --web.enable-lifecycle is set)
  • Call /api/v1/admin/tsdb/delete_series to delete data (only if --web.enable-admin-api is set)
  • Exfiltrate metric data to an external server

Note that this only affects users who have explicitly enabled the legacy Prometheus web UI using the --enable-feature=old-ui command-line flag.

Patches

A patch is available at https://github.com/prometheus/prometheus/releases/tag/v0.311.3.

Workarounds

If at all possible, disable the legacy web UI by removing the --enable-feature=old-ui command-line flag).

If this is not an option, take the following precautions:

  • If using the remote write receiver (--web.enable-remote-write-receiver), ensure it is not exposed to untrusted sources.
  • If using the OTLP receiver (--web.enable-otlp-receiver), ensure it is not exposed to untrusted sources.
  • Ensure scrape targets are trusted and not under attacker control.
  • Do not enable admin / mutating API endpoints (e.g. --web.enable-admin-api or web.enable-lifecycle) in cases where you cannot prevent untrusted data from being ingested.
  • Users should avoid clicking untrusted links, especially those containing functions such as label_replace, as they may generate poisoned label names and values.
Resources
  • CVE-2019-10215 — prior stored DOM XSS vulnerability in Prometheus query history, fixed in v2.7.2
  • CVE-2026-40179 — prior stored DOM XSS vulnerability in Prometheus web UI (hover tooltips and metrics explorer), fixed in v3.11.2

Severity

Medium

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Prometheus has Stored XSS via metric names and label values in Prometheus web UI tooltips and metrics explorer

BIT-prometheus-2026-40179 / CVE-2026-40179 / GHSA-vffh-x6r8-xx99

More information

Details

Impact

Stored cross-site scripting (XSS) via crafted metric names in the Prometheus web UI:

  • Old React UI + New Mantine UI: When a user hovers over a chart tooltip on the Graph page, metric names containing HTML/JavaScript are injected into innerHTML without escaping, causing arbitrary script execution in the user's browser.
  • Old React UI only: When a user opens the Metric Explorer (globe icon next to the PromQL expression input field), and a metric name containing HTML/JavaScript is rendered in the fuzzy search results, it is injected into innerHTML without escaping, causing arbitrary script execution in the user's browser.
  • Old React UI only: When a user views a heatmap chart and hovers over a cell, the le label values of the underlying histogram buckets are interpolated into innerHTML without escaping. While le is conventionally a numeric bucket boundary, Prometheus does not enforce this — arbitrary UTF-8 strings are accepted as label values, allowing script injection via a crafted scrape target or remote write.

With Prometheus v3.x defaulting to UTF-8 metric and label name validation, characters like <, >, and " are now valid in metric names and labels, making this exploitable.

An attacker who can inject metrics (via a compromised scrape target, remote write, or OTLP receiver endpoint) can execute JavaScript in the browser of any Prometheus user who views the metric in the Graph UI. From the XSS context, an attacker could for example:

  • Read /api/v1/status/config to extract sensitive configuration (although credentials / secrets are redacted by the server)
  • Call /-/quit to shut down Prometheus (only if --web.enable-lifecycle is set)
  • Call /api/v1/admin/tsdb/delete_series to delete data (only if --web.enable-admin-api is set)
  • Exfiltrate metric data to an external server

Both the new Mantine UI and the old React UI are affected. The vulnerable code paths are:

  • web/ui/mantine-ui/src/pages/query/uPlotChartHelpers.ts — tooltip innerHTML with unescaped labels.__name__
  • web/ui/react-app/src/pages/graph/GraphHelpers.ts — tooltip content with unescaped labels.__name__
  • web/ui/react-app/src/pages/graph/MetricsExplorer.tsx — fuzzy search results rendered via dangerouslySetInnerHTML without sanitization
  • web/ui/react-app/src/vendor/flot/jquery.flot.heatmap.js — heatmap tooltip with unescaped label values
Patches

A patch has been published in Prometheus 3.5.2 LTS and Prometheus 3.11.2. The fix applies escapeHTML() to all user-controlled values (metric names and label values) before inserting them into innerHTML. This advisory will be updated with the patched version once released.

Workarounds
  • If using the remote write receiver (--web.enable-remote-write-receiver), ensure it is not exposed to untrusted sources.
  • If using the OTLP receiver (--web.enable-otlp-receiver), ensure it is not exposed to untrusted sources.
  • Ensure scrape targets are trusted and not under attacker control.
  • Do not enable admin / mutating API endpoints (e.g. --web.enable-admin-api or web.enable-lifecycle) in cases where you cannot prevent untrusted data from being ingested.
  • Users should avoid clicking untrusted links, especially those containing functions such as label_replace, as they may generate poisoned label names and values.
Acknowledgements

Thanks to @​gladiator9797 (Duc Anh Nguyen from TinyxLab) for reporting this.

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Prometheus: Remote read endpoint allows denial of service via crafted snappy payload

BIT-prometheus-2026-42154 / CVE-2026-42154 / GHSA-8rm2-7qqf-34qm

More information

Details

Impact

The remote read endpoint (/api/v1/read) does not validate the declared decoded length in a snappy-compressed request body before allocating memory.
An unauthenticated attacker can send a small payload that causes a huge heap allocation per request. Under concurrent load this can exhaust available memory and crash the Prometheus process.

Patches

Has the problem been patched? What versions should users upgrade to?

Fixed in 3.11.3 and 3.5.3 LTS. Users should upgrade to these versions or later.

Workarounds

User who can not upgrade can place Prometheus behind a reverse proxy or firewall that requires authentication before requests reach /api/v1/read.

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Prometheus vulnerable to stored XSS via crafted histogram bucket label values in the old web UI heatmap display

GHSA-fw8g-cg8f-9j28

More information

Details

Impact

In the Prometheus server's legacy web UI (enabled via the command-line flag --enable-feature=old-ui), the histogram heatmap chart view does not escape le label values when inserting them into the HTML for use as axis tick mark labels.

An attacker who can inject crafted metrics (e.g. via a compromised scrape target, remote write, or OTLP receiver endpoint) can execute JavaScript in the browser of any Prometheus user who views the metric in the heatmap chart UI. From the XSS context, an attacker could for example:

  • Read /api/v1/status/config to extract sensitive configuration (although credentials / secrets are redacted by the server)
  • Call /-/quit to shut down Prometheus (only if --web.enable-lifecycle is set)
  • Call /api/v1/admin/tsdb/delete_series to delete data (only if --web.enable-admin-api is set)
  • Exfiltrate metric data to an external server

Note that this only affects users who have explicitly enabled the legacy Prometheus web UI using the --enable-feature=old-ui command-line flag.

Patches

A patch is available at https://github.com/prometheus/prometheus/releases/tag/v0.311.3.

Workarounds

If at all possible, disable the legacy web UI by removing the --enable-feature=old-ui command-line flag).

If this is not an option, take the following precautions:

  • If using the remote write receiver (--web.enable-remote-write-receiver), ensure it is not exposed to untrusted sources.
  • If using the OTLP receiver (--web.enable-otlp-receiver), ensure it is not exposed to untrusted sources.
  • Ensure scrape targets are trusted and not under attacker control.
  • Do not enable admin / mutating API endpoints (e.g. --web.enable-admin-api or web.enable-lifecycle) in cases where you cannot prevent untrusted data from being ingested.
  • Users should avoid clicking untrusted links, especially those containing functions such as label_replace, as they may generate poisoned label names and values.
Resources
  • CVE-2019-10215 — prior stored DOM XSS vulnerability in Prometheus query history, fixed in v2.7.2
  • CVE-2026-40179 — prior stored DOM XSS vulnerability in Prometheus web UI (hover tooltips and metrics explorer), fixed in v3.11.2

Severity

Moderate

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Prometheus Azure AD remote write OAuth client secret exposed via config API

BIT-prometheus-2026-42151 / CVE-2026-42151 / GHSA-wg65-39gg-5wfj

More information

Details

Impact

Users who use Azure AD remote write with OAuth authentication are impacted.

The client_secret field in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed as string instead of Secret. Prometheus redacts fields of type Secret when serving the configuration via the /-/config HTTP API endpoint. Because the field was a plain string, the Azure OAuth client secret was exposed in plaintext to any user or process with access to that endpoint.

Patches

The problem has been patched by changing ClientSecret in OAuthConfig to Secret. Users should upgrade to 3.11.3 or 3.5.3 LTS.

Workarounds

Users who can not upgrade can switch to Managed Identity or Workload Identity authentication for Azure AD remote write, which do not involve a client secret.

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Release Notes

prometheus/prometheus (github.com/prometheus/prometheus)

v0.311.3

Compare Source

v0.311.2

Compare Source

v0.311.1

Compare Source

v0.311.0

Compare Source

v0.310.0

Compare Source

v0.309.1

Compare Source

v0.309.0

Compare Source


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

Need help?

You can ask for more help in the following Slack channel: #proj-renovate-self-hosted. In that channel you can also find ADR and FAQ docs in the Resources section.

@renovate-sh-app
Copy link
Copy Markdown
Contributor Author

renovate-sh-app Bot commented Apr 13, 2026

⚠️ Artifact update problem

Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you click the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: go.sum
Command failed: go get -t ./...
go: downloading github.com/aws/aws-lambda-go v1.54.0
go: downloading github.com/aws/aws-sdk-go-v2 v1.41.7
go: downloading github.com/aws/aws-sdk-go-v2/config v1.32.17
go: downloading github.com/aws/aws-sdk-go-v2/service/s3 v1.100.1
go: downloading github.com/aws/aws-sdk-go-v2/service/secretsmanager v1.41.7
go: downloading github.com/aws/aws-sdk-go-v2/service/ssm v1.68.6
go: downloading github.com/aws/smithy-go v1.25.1
go: downloading github.com/go-kit/log v0.2.1
go: downloading github.com/gogo/protobuf v1.3.2
go: downloading github.com/golang/snappy v1.0.0
go: downloading github.com/grafana/dskit v0.0.0-20260324093927-3167f499dfc0
go: downloading github.com/grafana/loki/v3 v3.6.8
go: downloading github.com/pkg/errors v0.9.1
go: downloading github.com/prometheus/client_golang v1.23.2
go: downloading github.com/prometheus/common v0.67.5
go: downloading github.com/prometheus/prometheus v0.311.3
go: downloading github.com/grafana/loki/pkg/push v0.0.0-20260106103740-2203c1d8e8fa
go: downloading github.com/grafana/regexp v0.0.0-20250905093917-f7b3be9d1853
go: downloading github.com/stretchr/testify v1.11.1
go: downloading github.com/aws/aws-sdk-go-v2/credentials v1.19.16
go: downloading github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.18.23
go: downloading github.com/aws/aws-sdk-go-v2/service/signin v1.0.11
go: downloading github.com/aws/aws-sdk-go-v2/service/sso v1.30.17
go: downloading github.com/aws/aws-sdk-go-v2/service/ssooidc v1.35.21
go: downloading github.com/aws/aws-sdk-go-v2/service/sts v1.42.1
go: downloading github.com/aws/aws-sdk-go-v2/internal/configsources v1.4.23
go: downloading github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.7.10
go: downloading github.com/aws/aws-sdk-go-v2/internal/v4a v1.4.24
go: downloading github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.13.9
go: downloading github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.9.15
go: downloading github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.13.23
go: downloading github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.19.23
go: downloading github.com/go-logfmt/logfmt v0.6.1
go: downloading github.com/prometheus/client_model v0.6.2
go: downloading go.yaml.in/yaml/v2 v2.4.4
go: downloading google.golang.org/protobuf v1.36.11
go: downloading github.com/beorn7/perks v1.0.1
go: downloading github.com/cespare/xxhash/v2 v2.3.0
go: downloading github.com/prometheus/procfs v0.19.2
go: downloading golang.org/x/sys v0.42.0
go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc
go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2
go: downloading golang.org/x/text v0.35.0
go: downloading github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.7.23
go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822
go: downloading gopkg.in/yaml.v3 v3.0.1
go: downloading google.golang.org/grpc v1.80.0
go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20260401024825-9d38bb4040a9
go: downloading golang.org/x/net v0.52.0
go: downloading github.com/Masterminds/sprig/v3 v3.3.0
go: downloading github.com/fatih/color v1.18.0
go: downloading github.com/hashicorp/golang-lru/v2 v2.0.7
go: downloading github.com/jmespath/go-jmespath v0.4.0
go: downloading github.com/json-iterator/go v1.1.12
go: downloading github.com/google/go-cmp v0.7.0
go: downloading github.com/mitchellh/mapstructure v1.5.1-0.20220423185008-bf980b35cac4
go: downloading github.com/oschwald/geoip2-golang v1.13.0
go: downloading github.com/hashicorp/golang-lru v1.0.2
go: downloading github.com/uber/jaeger-client-go v2.30.0+incompatible
go: downloading golang.org/x/crypto v0.49.0
go: downloading golang.org/x/time v0.15.0
go: downloading gopkg.in/yaml.v2 v2.4.0
go: downloading github.com/dustin/go-humanize v1.0.1
go: downloading github.com/grafana/jsonparser v0.0.0-20241004153430-023329977675
go: downloading go4.org/netipx v0.0.0-20230125063823-8449b0a6169f
go: downloading go.opentelemetry.io/otel v1.43.0
go: downloading go.opentelemetry.io/otel/trace v1.43.0
go: downloading github.com/c2h5oh/datasize v0.0.0-20231215233829-aa82cc1e6500
go: downloading go.uber.org/atomic v1.11.0
go: downloading github.com/mattn/go-colorable v0.1.14
go: downloading github.com/mattn/go-isatty v0.0.20
go: downloading dario.cat/mergo v1.0.2
go: downloading github.com/Masterminds/goutils v1.1.1
go: downloading github.com/Masterminds/semver/v3 v3.4.0
go: downloading github.com/google/uuid v1.6.0
go: downloading github.com/huandu/xstrings v1.5.0
go: downloading github.com/mitchellh/copystructure v1.2.0
go: downloading github.com/shopspring/decimal v1.4.0
go: downloading github.com/spf13/cast v1.7.1
go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd
go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee
go: downloading github.com/alecthomas/units v0.0.0-20240927000941-0f3dac36c52b
go: downloading go.yaml.in/yaml/v3 v3.0.4
go: downloading github.com/golang-jwt/jwt/v5 v5.3.1
go: downloading github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f
go: downloading golang.org/x/oauth2 v0.36.0
go: downloading github.com/dennwc/varint v1.0.0
go: downloading github.com/gogo/status v1.1.1
go: downloading github.com/gogo/googleapis v1.4.1
go: downloading github.com/tjhop/slog-gokit v0.1.4
go: downloading github.com/stretchr/objx v0.5.2
go: downloading github.com/oschwald/maxminddb-golang v1.13.0
go: downloading github.com/mitchellh/reflectwalk v1.0.2
go: downloading github.com/klauspost/compress v1.18.5
go: downloading github.com/pb33f/libopenapi v0.34.3
go: downloading github.com/prometheus/client_golang/exp v0.0.0-20260325093428-d8591d0db856
go: downloading go.yaml.in/yaml/v4 v4.0.0-rc.4
go: downloading github.com/jpillora/backoff v1.0.0
go: downloading github.com/hashicorp/go-metrics v0.5.4
go: downloading github.com/hashicorp/go-sockaddr v1.0.7
go: downloading github.com/grafana/memberlist v0.3.1-0.20251126142931-6f9f62ab6f86
go: downloading github.com/opentracing/opentracing-go v1.2.1-0.20220228012449-10b1cf09e00b
go: downloading github.com/golang/protobuf v1.5.4
go: downloading github.com/gorilla/mux v1.8.1
go: downloading github.com/grafana/pyroscope-go/godeltaprof v0.1.9
go: downloading github.com/opentracing-contrib/go-grpc v0.1.2
go: downloading github.com/pires/go-proxyproto v0.11.0
go: downloading github.com/prometheus/exporter-toolkit v0.15.1
go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.66.0
go: downloading github.com/grafana/otel-profiling-go v0.5.1
go: downloading github.com/uber/jaeger-lib v2.4.1+incompatible
go: downloading go.opentelemetry.io/contrib/exporters/autoexport v0.66.0
go: downloading go.opentelemetry.io/contrib/propagators/jaeger v1.41.0
go: downloading go.opentelemetry.io/contrib/samplers/jaegerremote v0.35.0
go: downloading go.opentelemetry.io/otel/exporters/jaeger v1.17.0
go: downloading go.opentelemetry.io/otel/sdk v1.43.0
go: downloading github.com/edsrzf/mmap-go v1.2.0
go: downloading github.com/facette/natsort v0.0.0-20181210072756-2cd4dd1e2dcb
go: downloading github.com/grafana/gomemcache v0.0.0-20251127154401-74f93547077b
go: downloading github.com/redis/go-redis/v9 v9.10.0
go: downloading github.com/sony/gobreaker/v2 v2.3.0
go: downloading github.com/julienschmidt/httprouter v1.3.0
go: downloading github.com/prometheus/otlptranslator v1.0.0
go: downloading github.com/prometheus/sigv4 v0.4.1
go: downloading github.com/go-logr/logr v1.4.3
go: downloading go.opentelemetry.io/otel/metric v1.43.0
go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/httptrace/otelhttptrace v0.67.0
go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.67.0
go: downloading golang.org/x/sync v0.20.0
go: downloading github.com/open-telemetry/opentelemetry-collector-contrib/processor/deltatocumulativeprocessor v0.148.0
go: downloading go.opentelemetry.io/collector/component v1.54.0
go: downloading go.opentelemetry.io/collector/consumer v1.54.0
go: downloading go.opentelemetry.io/collector/pdata v1.54.0
go: downloading go.opentelemetry.io/collector/processor v1.54.0
go: downloading github.com/bboreham/go-loser v0.0.0-20230920113527-fcc2c21820a3
go: downloading github.com/oklog/ulid/v2 v2.1.1
go: downloading github.com/pb33f/libopenapi-validator v0.13.3
go: downloading github.com/oklog/ulid v1.3.1
go: downloading github.com/hashicorp/consul/api v1.33.4
go: downloading github.com/hashicorp/go-cleanhttp v0.5.2
go: downloading go.etcd.io/etcd/api/v3 v3.6.8
go: downloading go.etcd.io/etcd/client/pkg/v3 v3.6.8
go: downloading go.etcd.io/etcd/client/v3 v3.6.8
go: downloading github.com/hashicorp/go-immutable-radix v1.3.1
go: downloading github.com/google/btree v1.1.3
go: downloading github.com/hashicorp/go-msgpack/v2 v2.1.5
go: downloading github.com/hashicorp/go-multierror v1.1.1
go: downloading github.com/miekg/dns v1.1.72
go: downloading github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529
go: downloading github.com/sercand/kuberesolver/v6 v6.0.1
go: downloading github.com/felixge/httpsnoop v1.0.4
go: downloading github.com/opentracing-contrib/go-stdlib v1.1.1
go: downloading github.com/coreos/go-systemd/v22 v22.6.0
go: downloading github.com/mdlayher/vsock v1.2.1
go: downloading github.com/go-logr/stdr v1.2.2
go: downloading github.com/pb33f/ordered-map/v2 v2.3.0
go: downloading k8s.io/client-go v0.35.3
go: downloading github.com/jaegertracing/jaeger-idl v0.6.0
go: downloading go.opentelemetry.io/contrib/bridges/prometheus v0.66.0
go: downloading go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploggrpc v0.17.0
go: downloading go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploghttp v0.19.0
go: downloading go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v1.41.0
go: downloading go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetrichttp v1.43.0
go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.42.0
go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.43.0
go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.43.0
go: downloading go.opentelemetry.io/otel/exporters/prometheus v0.63.0
go: downloading go.opentelemetry.io/otel/exporters/stdout/stdoutlog v0.17.0
go: downloading go.opentelemetry.io/otel/exporters/stdout/stdoutmetric v1.41.0
go: downloading go.opentelemetry.io/otel/exporters/stdout/stdouttrace v1.41.0
go: downloading go.opentelemetry.io/otel/sdk/log v0.19.0
go: downloading go.opentelemetry.io/otel/sdk/metric v1.43.0
go: downloading github.com/kylelemons/godebug v1.1.0
go: downloading go.uber.org/goleak v1.3.0
go: downloading github.com/Azure/azure-sdk-for-go/sdk/azcore v1.21.0
go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.13.1
go: downloading google.golang.org/api v0.272.0
go: downloading go.opentelemetry.io/auto/sdk v1.2.1
go: downloading github.com/go-openapi/strfmt v0.26.1
go: downloading github.com/prometheus/alertmanager v0.31.1
go: downloading github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f
go: downloading go.uber.org/zap v1.27.1
go: downloading github.com/open-telemetry/opentelemetry-collector-contrib/internal/exp/metrics v0.148.0
go: downloading github.com/puzpuzpuz/xsync/v4 v4.4.0
go: downloading go.opentelemetry.io/collector/confmap/xconfmap v0.148.0
go: downloading go.opentelemetry.io/collector/confmap v1.54.0
go: downloading go.opentelemetry.io/collector/internal/componentalias v0.148.0
go: downloading go.opentelemetry.io/collector/pipeline v1.54.0
go: downloading golang.org/x/exp v0.0.0-20260218203240-3dfff04db8fa
go: downloading github.com/go-viper/mapstructure/v2 v2.5.0
go: downloading github.com/hashicorp/go-hclog v1.6.3
go: downloading github.com/hashicorp/go-rootcerts v1.0.2
go: downloading github.com/hashicorp/serf v0.10.2
go: downloading github.com/santhosh-tekuri/jsonschema/v6 v6.0.2
go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.28.0
go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20260401024825-9d38bb4040a9
go: downloading github.com/armon/go-metrics v0.4.1
go: downloading github.com/hashicorp/errwrap v1.1.0
go: downloading golang.org/x/tools v0.42.0
go: downloading github.com/fsnotify/fsnotify v1.9.0
go: downloading github.com/mdlayher/socket v0.5.1
go: downloading github.com/pb33f/jsonpath v0.8.1
go: downloading github.com/coreos/go-semver v0.3.1
go: downloading go.opentelemetry.io/proto/otlp v1.10.0
go: downloading github.com/bahlo/generic-list-go v0.2.0
go: downloading github.com/buger/jsonparser v1.1.2
go: downloading go.opentelemetry.io/otel/log v0.19.0
go: downloading k8s.io/apimachinery v0.35.3
go: downloading k8s.io/klog/v2 v2.140.0
go: downloading k8s.io/utils v0.0.0-20251002143259-bc988d571ff4
go: downloading cloud.google.com/go/compute/metadata v0.9.0
go: downloading github.com/Azure/azure-sdk-for-go/sdk/internal v1.11.2
go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.6.0
go: downloading github.com/go-openapi/errors v0.22.7
go: downloading github.com/go-openapi/swag v0.25.4
go: downloading github.com/go-openapi/validate v0.25.1
go: downloading go.uber.org/multierr v1.11.0
go: downloading github.com/open-telemetry/opentelemetry-collector-contrib/pkg/pdatautil v0.148.0
go: downloading go.opentelemetry.io/collector/featuregate v1.54.0
go: downloading github.com/mitchellh/go-homedir v1.1.0
go: downloading github.com/go-openapi/jsonpointer v0.22.5
go: downloading github.com/basgys/goxml2json v1.1.1-0.20231018121955-e66ee54ceaad
go: downloading github.com/cenkalti/backoff/v5 v5.0.3
go: downloading github.com/fxamacker/cbor/v2 v2.9.0
go: downloading sigs.k8s.io/randfill v1.0.0
go: downloading golang.org/x/term v0.41.0
go: downloading k8s.io/kube-openapi v0.0.0-20250910181357-589584f1c912
go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.0
go: downloading github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c
go: downloading github.com/gobwas/glob v0.2.3
go: downloading github.com/knadh/koanf/maps v0.1.2
go: downloading github.com/knadh/koanf/providers/confmap v1.0.0
go: downloading github.com/knadh/koanf/v2 v2.3.3
go: downloading github.com/go-openapi/swag/cmdutils v0.25.4
go: downloading github.com/go-openapi/swag/conv v0.25.4
go: downloading github.com/go-openapi/swag/fileutils v0.25.4
go: downloading github.com/go-openapi/swag/jsonname v0.25.5
go: downloading github.com/go-openapi/swag/jsonutils v0.25.4
go: downloading github.com/go-openapi/swag/loading v0.25.4
go: downloading github.com/go-openapi/swag/mangling v0.25.4
go: downloading github.com/go-openapi/swag/netutils v0.25.4
go: downloading github.com/go-openapi/swag/stringutils v0.25.4
go: downloading github.com/go-openapi/swag/typeutils v0.25.4
go: downloading github.com/go-openapi/swag/yamlutils v0.25.4
go: downloading github.com/hashicorp/go-version v1.8.0
go: downloading golang.org/x/mod v0.33.0
go: downloading sigs.k8s.io/yaml v1.6.0
go: downloading sigs.k8s.io/json v0.0.0-20250730193827-2d320260d730
go: downloading gopkg.in/inf.v0 v0.9.1
go: downloading github.com/x448/float16 v0.8.4
go: downloading github.com/go-openapi/analysis v0.24.2
go: downloading github.com/go-openapi/loads v0.23.2
go: downloading github.com/go-openapi/spec v0.22.3
go: downloading github.com/go-openapi/jsonreference v0.21.4
go: downloading github.com/googleapis/enterprise-certificate-proxy v0.3.14
go: downloading cloud.google.com/go/auth v0.18.2
go: downloading github.com/google/s2a-go v0.1.9
go: downloading cloud.google.com/go/auth/oauth2adapt v0.2.8
go: downloading github.com/googleapis/gax-go/v2 v2.18.0
go: main/pkg imports
	github.com/grafana/loki/v3/clients/pkg/logentry/stages imports
	github.com/grafana/loki/v3/pkg/util imports
	github.com/prometheus/prometheus/tsdb/errors: cannot find module providing package github.com/prometheus/prometheus/tsdb/errors

@renovate-sh-app renovate-sh-app Bot force-pushed the renovate/go-github.com-prometheus-prometheus-vulnerability branch 7 times, most recently from 318e5df to f5d0187 Compare April 22, 2026 01:14
@renovate-sh-app renovate-sh-app Bot force-pushed the renovate/go-github.com-prometheus-prometheus-vulnerability branch 3 times, most recently from ffa8263 to 484e847 Compare May 1, 2026 07:16
@renovate-sh-app renovate-sh-app Bot force-pushed the renovate/go-github.com-prometheus-prometheus-vulnerability branch from 484e847 to 05d97d5 Compare May 2, 2026 22:17
@renovate-sh-app renovate-sh-app Bot changed the title fix(deps): update module github.com/prometheus/prometheus to v0.311.2 [security] fix(deps): update module github.com/prometheus/prometheus to v0.311.2 [security] - autoclosed May 5, 2026
@renovate-sh-app renovate-sh-app Bot closed this May 5, 2026
auto-merge was automatically disabled May 5, 2026 01:13

Pull request was closed

@renovate-sh-app renovate-sh-app Bot deleted the renovate/go-github.com-prometheus-prometheus-vulnerability branch May 5, 2026 01:13
@renovate-sh-app renovate-sh-app Bot changed the title fix(deps): update module github.com/prometheus/prometheus to v0.311.2 [security] - autoclosed fix(deps): update module github.com/prometheus/prometheus to v0.311.2 [security] May 5, 2026
@renovate-sh-app renovate-sh-app Bot reopened this May 5, 2026
@renovate-sh-app renovate-sh-app Bot force-pushed the renovate/go-github.com-prometheus-prometheus-vulnerability branch from 05d97d5 to ace52bf Compare May 5, 2026 04:14
… [security]

| datasource | package                          | from     | to       |
| ---------- | -------------------------------- | -------- | -------- |
| go         | github.com/prometheus/prometheus | v0.308.1 | v0.311.3 |


Signed-off-by: renovate-sh-app[bot] <219655108+renovate-sh-app[bot]@users.noreply.github.com>
@renovate-sh-app renovate-sh-app Bot force-pushed the renovate/go-github.com-prometheus-prometheus-vulnerability branch from ace52bf to f2cb66b Compare May 5, 2026 22:14
@renovate-sh-app renovate-sh-app Bot enabled auto-merge (squash) May 5, 2026 22:14
@renovate-sh-app renovate-sh-app Bot changed the title fix(deps): update module github.com/prometheus/prometheus to v0.311.2 [security] fix(deps): update module github.com/prometheus/prometheus to v0.311.3 [security] May 5, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants