Debian Package Tracker
Register | Log in
Subscribe

async-http-client

Java Asynchronous HTTP Client

Choose email to subscribe with

general
  • source: async-http-client (main)
  • version: 2.12.3-1
  • maintainer: Debian Java Maintainers (archive) (DMD)
  • uploaders: Emmanuel Bourg [DMD]
  • arch: all
  • std-ver: 4.6.0.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.12.2-1
  • oldstable: 2.12.3-1
  • unstable: 2.12.3-1
versioned links
  • 2.12.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.12.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libasync-http-client-java (1 bugs: 0, 1, 0, 0)
action needed
A new upstream version is available: 3.0.9 high
A new upstream version 3.0.9 is available, you should consider packaging it.
Created: 2025-11-26 Last update: 2026-04-28 08:31
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2024-53990: The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When making any HTTP request, the automatically enabled and self-managed CookieStore (aka cookie jar) will silently replace explicitly defined Cookies with any that have the same name from the cookie jar. For services that operate with multiple users, this can result in one user's Cookie being used for another user's requests.
  • CVE-2026-40490: The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When redirect following is enabled (followRedirect(true)), versions of AsyncHttpClient prior to 3.0.9 and 2.14.5 forward Authorization and Proxy-Authorization headers along with Realm credentials to arbitrary redirect targets regardless of domain, scheme, or port changes. This leaks credentials on cross-domain redirects and HTTPS-to-HTTP downgrades. Additionally, even when stripAuthorizationOnRedirect is set to true, the Realm object containing plaintext credentials is still propagated to the redirect request, causing credential re-generation for Basic and Digest authentication schemes via NettyRequestFactory. An attacker who controls a redirect target (via open redirect, DNS rebinding, or MITM on HTTP) can capture Bearer tokens, Basic auth credentials, or any other Authorization header value. The fix in versions 3.0.9 and 2.14.5 automatically strips Authorization and Proxy-Authorization headers and clears Realm credentials whenever a redirect crosses origin boundaries (different scheme, host, or port) or downgrades from HTTPS to HTTP. For users unable to upgrade, set `(stripAuthorizationOnRedirect(true))` in the client config and avoid using Realm-based authentication with redirect following enabled. Note that `(stripAuthorizationOnRedirect(true))` alone is insufficient on versions prior to 3.0.9 and 2.14.5 because the Realm bypass still re-generates credentials. Alternatively, disable redirect following (`followRedirect(false)`) and handle redirects manually with origin validation.
Created: 2024-12-04 Last update: 2026-04-19 00:01
2 security issues in bookworm high

There are 2 open security issues in bookworm.

1 important issue:
  • CVE-2026-40490: The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When redirect following is enabled (followRedirect(true)), versions of AsyncHttpClient prior to 3.0.9 and 2.14.5 forward Authorization and Proxy-Authorization headers along with Realm credentials to arbitrary redirect targets regardless of domain, scheme, or port changes. This leaks credentials on cross-domain redirects and HTTPS-to-HTTP downgrades. Additionally, even when stripAuthorizationOnRedirect is set to true, the Realm object containing plaintext credentials is still propagated to the redirect request, causing credential re-generation for Basic and Digest authentication schemes via NettyRequestFactory. An attacker who controls a redirect target (via open redirect, DNS rebinding, or MITM on HTTP) can capture Bearer tokens, Basic auth credentials, or any other Authorization header value. The fix in versions 3.0.9 and 2.14.5 automatically strips Authorization and Proxy-Authorization headers and clears Realm credentials whenever a redirect crosses origin boundaries (different scheme, host, or port) or downgrades from HTTPS to HTTP. For users unable to upgrade, set `(stripAuthorizationOnRedirect(true))` in the client config and avoid using Realm-based authentication with redirect following enabled. Note that `(stripAuthorizationOnRedirect(true))` alone is insufficient on versions prior to 3.0.9 and 2.14.5 because the Realm bypass still re-generates credentials. Alternatively, disable redirect following (`followRedirect(false)`) and handle redirects manually with origin validation.
1 issue left for the package maintainer to handle:
  • CVE-2024-53990: (needs triaging) The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When making any HTTP request, the automatically enabled and self-managed CookieStore (aka cookie jar) will silently replace explicitly defined Cookies with any that have the same name from the cookie jar. For services that operate with multiple users, this can result in one user's Cookie being used for another user's requests.

You can find information about how to handle this issue in the security team's documentation.

Created: 2024-12-04 Last update: 2026-04-19 00:01
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2024-53990: The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When making any HTTP request, the automatically enabled and self-managed CookieStore (aka cookie jar) will silently replace explicitly defined Cookies with any that have the same name from the cookie jar. For services that operate with multiple users, this can result in one user's Cookie being used for another user's requests.
Created: 2024-12-04 Last update: 2025-01-06 10:00
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 5-day delay is over. Check why.
Created: 2026-04-13 Last update: 2026-04-28 10:02
lintian reports 3 warnings normal
Lintian reports 3 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2021-10-13 Last update: 2026-04-10 13:32
1 open merge request in Salsa normal
There is 1 open merge request for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-08-19 Last update: 2025-08-19 06:28
debian/patches: 1 patch to forward upstream low

Among the 1 debian patch available in version 2.12.3-1 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-02-26 15:54
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.6.0.1).
Created: 2022-05-11 Last update: 2026-03-31 15:01
testing migrations
  • excuses:
    • Migration status for async-http-client (- to 2.12.3-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Updating async-http-client would introduce bugs in testing: #1089228
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/a/async-http-client.html
    • ∙ ∙ Reproduced on amd64
    • ∙ ∙ Reproduced on arm64
    • ∙ ∙ Reproduced on armhf
    • ∙ ∙ Reproduced on i386
    • ∙ ∙ Reproduced on ppc64el
    • ∙ ∙ 1683 days old (needed 5 days)
    • Not considered
news
[rss feed]
  • [2025-01-07] async-http-client REMOVED from testing (Debian testing watch)
  • [2021-09-23] async-http-client 2.12.3-1 MIGRATED to testing (Debian testing watch)
  • [2021-09-18] Accepted async-http-client 2.12.3-1 (source) into unstable (Emmanuel Bourg)
  • [2021-01-24] async-http-client 2.12.2-1 MIGRATED to testing (Debian testing watch)
  • [2021-01-18] Accepted async-http-client 2.12.2-1 (source) into unstable (Emmanuel Bourg)
  • [2020-04-21] async-http-client 2.11.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-04-16] Accepted async-http-client 2.11.0-1 (source) into unstable (Sudip Mukherjee) (signed by: tony mancill)
  • [2018-12-02] async-http-client 2.6.0-1 MIGRATED to testing (Debian testing watch)
  • [2018-11-27] Accepted async-http-client 2.6.0-1 (source) into unstable (Emmanuel Bourg)
  • [2018-09-11] async-http-client REMOVED from testing (Debian testing watch)
  • [2017-11-26] async-http-client 1.6.5-5 MIGRATED to testing (Debian testing watch)
  • [2017-11-20] Accepted async-http-client 1.6.5-5 (source) into unstable (Emmanuel Bourg)
  • [2015-08-03] async-http-client 1.6.5-4 MIGRATED to testing (Britney)
  • [2015-07-28] Accepted async-http-client 1.6.5-4 (source all) into unstable (Emmanuel Bourg)
  • [2014-12-27] async-http-client 1.6.5-3 MIGRATED to testing (Britney)
  • [2014-12-17] Accepted async-http-client 1.6.5-3 (source all) into unstable (Emmanuel Bourg)
  • [2014-02-18] async-http-client 1.6.5-2 MIGRATED to testing (Debian testing watch)
  • [2014-02-13] Accepted async-http-client 1.6.5-2 (source all) (tony mancill)
  • [2011-12-14] async-http-client 1.6.5-1 MIGRATED to testing (Debian testing watch)
  • [2011-12-03] Accepted async-http-client 1.6.5-1 (source all) (Damien Raude-Morvan)
bugs [bug history graph]
  • all: 5
  • RC: 1
  • I&N: 3
  • M&W: 1
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 3)
  • buildd: logs
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.12.3-1ubuntu1
  • patches for 2.12.3-1ubuntu1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing