Source: glances
Version: 4.3.3+dfsg-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for glances.

CVE-2026-30930[0]:
| Glances is an open-source system cross-platform monitoring tool.
| Prior to 4.5.1, The TimescaleDB export module constructs SQL queries
| using string concatenation with unsanitized system monitoring data.
| The normalize() method wraps string values in single quotes but does
| not escape embedded single quotes, making SQL injection trivial via
| attacker-controlled data such as process names, filesystem mount
| points, network interface names, or container names. This
| vulnerability is fixed in 4.5.1.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-30930
    https://www.cve.org/CVERecord?id=CVE-2026-30930
[1] https://github.com/nicolargo/glances/security/advisories/GHSA-x46r-mf5g-xpr6
[2] 
https://github.com/nicolargo/glances/commit/39161f0d6fd723d83f534b48f24cdca722573336

Regards,
Salvatore

Reply via email to