OPENSUSE-SU-2026:10415-1

Vulnerability from csaf_opensuse - Published: 2026-03-24 00:00 - Updated: 2026-03-24 00:00
Summary
glances-common-4.5.2-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: glances-common-4.5.2-1.1 on GA media
Description of the patch: These are all security issues fixed in the glances-common-4.5.2-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2026-10415
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "glances-common-4.5.2-1.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the glances-common-4.5.2-1.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2026-10415",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10415-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-32596 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-32596/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-32608 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-32608/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-32609 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-32609/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-32610 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-32610/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-32611 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-32611/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-32632 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-32632/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-32633 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-32633/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-32634 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-32634/"
      }
    ],
    "title": "glances-common-4.5.2-1.1 on GA media",
    "tracking": {
      "current_release_date": "2026-03-24T00:00:00Z",
      "generator": {
        "date": "2026-03-24T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2026:10415-1",
      "initial_release_date": "2026-03-24T00:00:00Z",
      "revision_history": [
        {
          "date": "2026-03-24T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "glances-common-4.5.2-1.1.aarch64",
                "product": {
                  "name": "glances-common-4.5.2-1.1.aarch64",
                  "product_id": "glances-common-4.5.2-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python311-Glances-4.5.2-1.1.aarch64",
                "product": {
                  "name": "python311-Glances-4.5.2-1.1.aarch64",
                  "product_id": "python311-Glances-4.5.2-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python313-Glances-4.5.2-1.1.aarch64",
                "product": {
                  "name": "python313-Glances-4.5.2-1.1.aarch64",
                  "product_id": "python313-Glances-4.5.2-1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "glances-common-4.5.2-1.1.ppc64le",
                "product": {
                  "name": "glances-common-4.5.2-1.1.ppc64le",
                  "product_id": "glances-common-4.5.2-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python311-Glances-4.5.2-1.1.ppc64le",
                "product": {
                  "name": "python311-Glances-4.5.2-1.1.ppc64le",
                  "product_id": "python311-Glances-4.5.2-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python313-Glances-4.5.2-1.1.ppc64le",
                "product": {
                  "name": "python313-Glances-4.5.2-1.1.ppc64le",
                  "product_id": "python313-Glances-4.5.2-1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "glances-common-4.5.2-1.1.s390x",
                "product": {
                  "name": "glances-common-4.5.2-1.1.s390x",
                  "product_id": "glances-common-4.5.2-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python311-Glances-4.5.2-1.1.s390x",
                "product": {
                  "name": "python311-Glances-4.5.2-1.1.s390x",
                  "product_id": "python311-Glances-4.5.2-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python313-Glances-4.5.2-1.1.s390x",
                "product": {
                  "name": "python313-Glances-4.5.2-1.1.s390x",
                  "product_id": "python313-Glances-4.5.2-1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "glances-common-4.5.2-1.1.x86_64",
                "product": {
                  "name": "glances-common-4.5.2-1.1.x86_64",
                  "product_id": "glances-common-4.5.2-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python311-Glances-4.5.2-1.1.x86_64",
                "product": {
                  "name": "python311-Glances-4.5.2-1.1.x86_64",
                  "product_id": "python311-Glances-4.5.2-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python313-Glances-4.5.2-1.1.x86_64",
                "product": {
                  "name": "python313-Glances-4.5.2-1.1.x86_64",
                  "product_id": "python313-Glances-4.5.2-1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glances-common-4.5.2-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64"
        },
        "product_reference": "glances-common-4.5.2-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glances-common-4.5.2-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le"
        },
        "product_reference": "glances-common-4.5.2-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glances-common-4.5.2-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x"
        },
        "product_reference": "glances-common-4.5.2-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glances-common-4.5.2-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64"
        },
        "product_reference": "glances-common-4.5.2-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-Glances-4.5.2-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64"
        },
        "product_reference": "python311-Glances-4.5.2-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-Glances-4.5.2-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le"
        },
        "product_reference": "python311-Glances-4.5.2-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-Glances-4.5.2-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x"
        },
        "product_reference": "python311-Glances-4.5.2-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-Glances-4.5.2-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64"
        },
        "product_reference": "python311-Glances-4.5.2-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python313-Glances-4.5.2-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64"
        },
        "product_reference": "python313-Glances-4.5.2-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python313-Glances-4.5.2-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le"
        },
        "product_reference": "python313-Glances-4.5.2-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python313-Glances-4.5.2-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x"
        },
        "product_reference": "python313-Glances-4.5.2-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python313-Glances-4.5.2-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
        },
        "product_reference": "python313-Glances-4.5.2-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-32596",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-32596"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.2, Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process command-lines containing credentials (passwords, API keys, tokens) to any network client. Version 4.5.2 fixes the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-32596",
          "url": "https://www.suse.com/security/cve/CVE-2026-32596"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1260321 for CVE-2026-32596",
          "url": "https://bugzilla.suse.com/1260321"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-24T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-32596"
    },
    {
      "cve": "CVE-2026-32608",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-32608"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Glances is an open-source system cross-platform monitoring tool. The Glances action system allows administrators to configure shell commands that execute when monitoring thresholds are exceeded. These commands support Mustache template variables (e.g., `{{name}}`, `{{key}}`) that are populated with runtime monitoring data. The `secure_popen()` function, which executes these commands, implements its own pipe, redirect, and chain operator handling by splitting the command string before passing each segment to `subprocess.Popen(shell=False)`. Prior to 4.5.2, when a Mustache-rendered value (such as a process name, filesystem mount point, or container name) contains pipe, redirect, or chain metacharacters, the rendered command is split in unintended ways, allowing an attacker who controls a process name or container name to inject arbitrary commands. Version 4.5.2 fixes the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-32608",
          "url": "https://www.suse.com/security/cve/CVE-2026-32608"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1260320 for CVE-2026-32608",
          "url": "https://bugzilla.suse.com/1260320"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-24T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-32608"
    },
    {
      "cve": "CVE-2026-32609",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-32609"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Glances is an open-source system cross-platform monitoring tool. The GHSA-gh4x fix (commit 5d3de60) addressed unauthenticated configuration secrets exposure on the `/api/v4/config` endpoints by introducing `as_dict_secure()` redaction. However, the `/api/v4/args` and `/api/v4/args/{item}` endpoints were not addressed by this fix. These endpoints return the complete command-line arguments namespace via `vars(self.args)`, which includes the password hash (salt + pbkdf2_hmac), SNMP community strings, SNMP authentication keys, and the configuration file path. When Glances runs without `--password` (the default), these endpoints are accessible without any authentication. Version 4.5.2 provides a more complete fix.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-32609",
          "url": "https://www.suse.com/security/cve/CVE-2026-32609"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259832 for CVE-2026-32609",
          "url": "https://bugzilla.suse.com/1259832"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-24T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-32609"
    },
    {
      "cve": "CVE-2026-32610",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-32610"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, the Glances REST API web server ships with a default CORS configuration that sets `allow_origins=[\"*\"]` combined with `allow_credentials=True`. When both of these options are enabled together, Starlette\u0027s `CORSMiddleware` reflects the requesting `Origin` header value in the `Access-Control-Allow-Origin` response header instead of returning the literal `*` wildcard. This effectively grants any website the ability to make credentialed cross-origin API requests to the Glances server, enabling cross-site data theft of system monitoring information, configuration secrets, and command line arguments from any user who has an active browser session with a Glances instance. Version 4.5.2 fixes the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-32610",
          "url": "https://www.suse.com/security/cve/CVE-2026-32610"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259841 for CVE-2026-32610",
          "url": "https://bugzilla.suse.com/1259841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-24T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-32610"
    },
    {
      "cve": "CVE-2026-32611",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-32611"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Glances is an open-source system cross-platform monitoring tool. The GHSA-x46r fix (commit 39161f0) addressed SQL injection in the TimescaleDB export module by converting all SQL operations to use parameterized queries and `psycopg.sql` composable objects. However, the DuckDB export module (`glances/exports/glances_duckdb/__init__.py`) was not included in this fix and contains the same class of vulnerability: table names and column names derived from monitoring statistics are directly interpolated into SQL statements via f-strings. While DuckDB INSERT values already use parameterized queries (`?` placeholders), the DDL construction and table name references do not escape or parameterize identifier names. Version 4.5.3 provides a more complete fix.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-32611",
          "url": "https://www.suse.com/security/cve/CVE-2026-32611"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259840 for CVE-2026-32611",
          "url": "https://bugzilla.suse.com/1259840"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-24T00:00:00Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2026-32611"
    },
    {
      "cve": "CVE-2026-32632",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-32632"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Glances is an open-source system cross-platform monitoring tool. Glances recently added DNS rebinding protection for the MCP endpoint, but prior to version 4.5.2, the main REST/WebUI FastAPI application still accepts arbitrary `Host` headers and does not apply `TrustedHostMiddleware` or an equivalent host allowlist. As a result, the REST API, WebUI, and token endpoint remain reachable through attacker-controlled domains in classic DNS rebinding scenarios. Once the victim browser has rebound the attacker domain to the Glances service, same-origin policy no longer protects the API because the browser considers the rebinding domain to be the origin. This is a distinct issue from the previously reported default CORS weakness. CORS is not required for exploitation here because DNS rebinding causes the victim browser to treat the malicious domain as same-origin with the rebinding target. Version 4.5.2 contains a patch for the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-32632",
          "url": "https://www.suse.com/security/cve/CVE-2026-32632"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259839 for CVE-2026-32632",
          "url": "https://bugzilla.suse.com/1259839"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-24T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-32632"
    },
    {
      "cve": "CVE-2026-32633",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-32633"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, in Central Browser mode, the `/api/4/serverslist` endpoint returns raw server objects from `GlancesServersList.get_servers_list()`. Those objects are mutated in-place during background polling and can contain a `uri` field with embedded HTTP Basic credentials for downstream Glances servers, using the reusable pbkdf2-derived Glances authentication secret. If the front Glances Browser/API instance is started without `--password`, which is supported and common for internal network deployments, `/api/4/serverslist` is completely unauthenticated. Any network user who can reach the Browser API can retrieve reusable credentials for protected downstream Glances servers once they have been polled by the browser instance. Version 4.5.2 fixes the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-32633",
          "url": "https://www.suse.com/security/cve/CVE-2026-32633"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259838 for CVE-2026-32633",
          "url": "https://bugzilla.suse.com/1259838"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-24T00:00:00Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2026-32633"
    },
    {
      "cve": "CVE-2026-32634",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-32634"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, in Central Browser mode, Glances stores both the Zeroconf-advertised server name and the discovered IP address for dynamic servers, but later builds connection URIs from the untrusted advertised name instead of the discovered IP. When a dynamic server reports itself as protected, Glances also uses that same untrusted name as the lookup key for saved passwords and the global `[passwords] default` credential. An attacker on the same local network can advertise a fake Glances service over Zeroconf and cause the browser to automatically send a reusable Glances authentication secret to an attacker-controlled host. This affects the background polling path and the REST/WebUI click-through path in Central Browser mode. Version 4.5.2 fixes the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
          "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-32634",
          "url": "https://www.suse.com/security/cve/CVE-2026-32634"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259837 for CVE-2026-32634",
          "url": "https://bugzilla.suse.com/1259837"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:glances-common-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python311-Glances-4.5.2-1.1.x86_64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.aarch64",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.ppc64le",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.s390x",
            "openSUSE Tumbleweed:python313-Glances-4.5.2-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-24T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-32634"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…