pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/sysutils/py-Glances
Module Name: pkgsrc
Committed By: fox
Date: Mon Mar 30 10:33:25 UTC 2026
Modified Files:
pkgsrc/sysutils/py-Glances: Makefile distinfo
Log Message:
sysutils/py-Glances: Update to 4.5.2
Changes since 4.5.1:
=============
Version 4.5.2
=============
Bug corrected:
* System display error on "little" terminal #3469
Security patches:
* Default CORS Configuration Allows Cross-Origin Credential Theft - Correct
CVE-2026-32610
* Incomplete Secrets Redaction: /api/v4/args Endpoint Leaks Password Hash
and SNMP Credentials - Correct CVE-2026-32609
* REST/WebUI Lacks Host Validation and Remains Exposed to DNS Rebinding -
Correct CVE-2026-32632
* Unauthenticated API Exposure / Add warning message on startup - Correct
CVE-2026-32596
* SQL Injection in DuckDB Export via Unparameterized DDL Statements -
Correct CVE-2026-32611
* Command Injection via Process Names in Action Command Templates - Correct
CVE-2026-32608
* Central Browser Autodiscovery Leaks Reusable Credentials to
Zeroconf-Spoofed Servers - Correct CVE-2026-32634
* Browser API Exposes Reusable Downstream Credentials - Correct
CVE-2026-32633
Breaking changes:
This release addresses 8 security vulnerabilities. Several of the mitigations
change observable behaviour. Users who run Glances in web server or API mode
should read the items below before upgrading.
* [CVE-2026-32632] Host header validation is now enforced on the built-in
web server. Requests whose Host header does not match localhost or
127.0.0.1 will be rejected with HTTP 400 by default. Users accessing
Glances through a reverse proxy, a custom hostname, or a non-loopback IP
address must declare the allowed values with the new allowed_hosts key in
the [outputs] section of glances.conf (comma-separated list). This was
already required for the MCP server since 4.5.1; it now also applies to
the main REST/WebUI server.
* [CVE-2026-32610] The default CORS policy is now restrictive. Previously,
the server replied with Access-Control-Allow-Origin: * which allowed any
web page to issue credentialed cross-origin requests against the API. The
wildcard is removed. Users running third-party web dashboards or custom
front-ends on a different origin must explicitly list allowed origins with
the cors_origins key in the [outputs] section of glances.conf.
* [CVE-2026-32609] Sensitive fields are now redacted on unauthenticated API
responses. The /api/4/args and /api/4/config endpoints no longer return
password hashes, SSL key paths, or SNMP community strings to callers that
have not authenticated. Scripts and integrations that relied on reading
these values from the API must now authenticate (token or password) to
receive them.
* [CVE-2026-32633, CVE-2026-32634] The Browser (multi-server mode) no longer
forwards configured credentials to remote Glances servers, whether
discovered via Zeroconf or listed in the [serverlist] section. Credentials
are only sent after the user explicitly logs in to an individual server.
Automated setups that relied on transparent credential propagation must
switch to per-server authentication.
* [CVE-2026-32596] A WARNING is now printed to stdout at startup when the
REST API is running without authentication (no --password and no API token
configured). This is an informational message; the unauthenticated mode
itself is unchanged and remains the default for private-network
deployments. Startup scripts or monitoring pipelines that treat any
stderr/stdout output as a failure may need to be updated.
* [CVE-2026-32611] The DuckDB export module now uses parameterized DDL
statements. Table names derived from plugin or metric names are sanitized
before use. Existing DuckDB databases whose table names contained
characters that were previously interpolated verbatim may need to be
recreated.
* [CVE-2026-32608] Process names used in [action] command templates are now
shell-escaped before substitution. Templates that relied on unescaped
special characters in process names to construct compound shell
expressions will no longer behave as before.
Thanks to @psyberck for the UI patch and @DhiyaneshGeek / @restriction for
CVEs reports.
To generate a diff of this commit:
cvs rdiff -u -r1.45 -r1.46 pkgsrc/sysutils/py-Glances/Makefile
cvs rdiff -u -r1.38 -r1.39 pkgsrc/sysutils/py-Glances/distinfo
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/sysutils/py-Glances/Makefile
diff -u pkgsrc/sysutils/py-Glances/Makefile:1.45 pkgsrc/sysutils/py-Glances/Makefile:1.46
--- pkgsrc/sysutils/py-Glances/Makefile:1.45 Sun Mar 8 11:22:25 2026
+++ pkgsrc/sysutils/py-Glances/Makefile Mon Mar 30 10:33:25 2026
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.45 2026/03/08 11:22:25 fox Exp $
+# $NetBSD: Makefile,v 1.46 2026/03/30 10:33:25 fox Exp $
-DISTNAME= glances-4.5.1
+DISTNAME= glances-4.5.2
PKGNAME= ${PYPKGPREFIX}-${DISTNAME:S/g/G/}
CATEGORIES= sysutils python
MASTER_SITES= ${MASTER_SITE_PYPI:=g/glances/}
Index: pkgsrc/sysutils/py-Glances/distinfo
diff -u pkgsrc/sysutils/py-Glances/distinfo:1.38 pkgsrc/sysutils/py-Glances/distinfo:1.39
--- pkgsrc/sysutils/py-Glances/distinfo:1.38 Sun Mar 8 11:22:25 2026
+++ pkgsrc/sysutils/py-Glances/distinfo Mon Mar 30 10:33:25 2026
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.38 2026/03/08 11:22:25 fox Exp $
+$NetBSD: distinfo,v 1.39 2026/03/30 10:33:25 fox Exp $
-BLAKE2s (glances-4.5.1.tar.gz) = 5ed4af41781995027dfc5d967743e6b97929af7ef0b5f29e742943d5d7b0dd43
-SHA512 (glances-4.5.1.tar.gz) = 1000196f8b59f14f4f7d9cf33f2d53e804b7f2d05203efa2570a1ecf184e001230bdeeab74ced71ace666ebf5f7faa7fe3ea83a701640ba9f4c61b1cfc45d007
-Size (glances-4.5.1.tar.gz) = 7399451 bytes
+BLAKE2s (glances-4.5.2.tar.gz) = 6f69ca1dd1bc58f430c7977323a1417c26bd6cd9259ed30b82378932e51a6200
+SHA512 (glances-4.5.2.tar.gz) = e7a5fe63381f30965c13dcb078385cbf0d3bbe8322a4235c2ac195fe760681fb83637dec20737ee649d8ea3087d483dc132b3c58a7c85be3e351f2b9f4a9efbc
+Size (glances-4.5.2.tar.gz) = 7418802 bytes
SHA1 (patch-glances_plugins_diskio_____init____.py) = 1656f96b41b9fce10a3f0dca9d39012f0b51200c
Home |
Main Index |
Thread Index |
Old Index