Source: glances
Version: 4.3.3+dfsg-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for glances.

CVE-2026-30928[0]:
| Glances is an open-source system cross-platform monitoring tool.
| Prior to 4.5.1, the /api/4/config REST API endpoint returns the
| entire parsed Glances configuration file (glances.conf) via
| self.config.as_dict() with no filtering of sensitive values. The
| configuration file contains credentials for all configured backend
| services including database passwords, API tokens, JWT signing keys,
| and SSL key passwords. This vulnerability is fixed in 4.5.1.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-30928
    https://www.cve.org/CVERecord?id=CVE-2026-30928
[1] https://github.com/nicolargo/glances/security/advisories/GHSA-gh4x-f7cq-wwx6
[2] 
https://github.com/nicolargo/glances/commit/5d3de603e63f21b0fd6aa2b9da0301f757c33e39

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to