Source: glances Version: 4.3.3+dfsg-1 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for glances. CVE-2026-30928[0]: | Glances is an open-source system cross-platform monitoring tool. | Prior to 4.5.1, the /api/4/config REST API endpoint returns the | entire parsed Glances configuration file (glances.conf) via | self.config.as_dict() with no filtering of sensitive values. The | configuration file contains credentials for all configured backend | services including database passwords, API tokens, JWT signing keys, | and SSL key passwords. This vulnerability is fixed in 4.5.1. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-30928 https://www.cve.org/CVERecord?id=CVE-2026-30928 [1] https://github.com/nicolargo/glances/security/advisories/GHSA-gh4x-f7cq-wwx6 [2] https://github.com/nicolargo/glances/commit/5d3de603e63f21b0fd6aa2b9da0301f757c33e39 Please adjust the affected versions in the BTS as needed. Regards, Salvatore

