Debian Package Tracker
Register | Log in
Subscribe

mistune

Markdown parser for Python 3

Choose email to subscribe with

general
  • source: mistune (main)
  • version: 3.1.4-1
  • maintainer: Debian Python Team (DMD)
  • uploaders: Julien Puydt [DMD]
  • arch: all
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.8.4-4
  • oldstable: 2.0.4-1
  • stable: 3.1.3-1
  • testing: 3.1.4-1
  • unstable: 3.1.4-1
versioned links
  • 0.8.4-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.0.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.1.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.1.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • python3-mistune
action needed
A new upstream version is available: 3.2.1 high
A new upstream version 3.2.1 is available, you should consider packaging it.
Created: 2025-12-25 Last update: 2026-05-15 07:30
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-33079: In versions 3.0.0a1 through 3.2.0 of Mistune, there is a ReDoS (Regular Expression Denial of Service) vulnerability in `LINK_TITLE_RE` that allows an attacker who can supply Markdown for parsing to cause denial of service. The regular expression used for parsing link titles contains overlapping alternatives that can trigger catastrophic backtracking. In both the double-quoted and single-quoted branches, a backslash followed by punctuation can be matched either as an escaped punctuation sequence or as two ordinary characters, creating an ambiguous pattern inside a repeated group. If an attacker supplies Markdown containing repeated ! sequences with no closing quote, the regex engine explores an exponential number of backtracking paths. This is reachable through normal Markdown parsing of inline links and block link reference definitions. A small crafted input can therefore cause significant CPU consumption and make applications using Mistune unresponsive.
Created: 2026-05-07 Last update: 2026-05-07 14:03
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-33079: In versions 3.0.0a1 through 3.2.0 of Mistune, there is a ReDoS (Regular Expression Denial of Service) vulnerability in `LINK_TITLE_RE` that allows an attacker who can supply Markdown for parsing to cause denial of service. The regular expression used for parsing link titles contains overlapping alternatives that can trigger catastrophic backtracking. In both the double-quoted and single-quoted branches, a backslash followed by punctuation can be matched either as an escaped punctuation sequence or as two ordinary characters, creating an ambiguous pattern inside a repeated group. If an attacker supplies Markdown containing repeated ! sequences with no closing quote, the regex engine explores an exponential number of backtracking paths. This is reachable through normal Markdown parsing of inline links and block link reference definitions. A small crafted input can therefore cause significant CPU consumption and make applications using Mistune unresponsive.
Created: 2026-05-07 Last update: 2026-05-07 14:03
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2026-33079: (postponed; to be fixed through a stable update) In versions 3.0.0a1 through 3.2.0 of Mistune, there is a ReDoS (Regular Expression Denial of Service) vulnerability in `LINK_TITLE_RE` that allows an attacker who can supply Markdown for parsing to cause denial of service. The regular expression used for parsing link titles contains overlapping alternatives that can trigger catastrophic backtracking. In both the double-quoted and single-quoted branches, a backslash followed by punctuation can be matched either as an escaped punctuation sequence or as two ordinary characters, creating an ambiguous pattern inside a repeated group. If an attacker supplies Markdown containing repeated ! sequences with no closing quote, the regex engine explores an exponential number of backtracking paths. This is reachable through normal Markdown parsing of inline links and block link reference definitions. A small crafted input can therefore cause significant CPU consumption and make applications using Mistune unresponsive.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-05-07 Last update: 2026-05-07 14:03
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.2).
Created: 2025-12-23 Last update: 2026-03-31 15:01
news
[rss feed]
  • [2025-09-11] mistune 3.1.4-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-09] Accepted mistune 3.1.4-1 (source) into unstable (Colin Watson)
  • [2025-04-27] mistune 3.1.3-1 MIGRATED to testing (Debian testing watch)
  • [2025-03-31] Accepted mistune 3.1.3-1 (source) into unstable (Boyuan Yang)
  • [2024-10-14] mistune 3.0.2-2 MIGRATED to testing (Debian testing watch)
  • [2024-10-11] Accepted mistune 3.0.2-2 (source) into unstable (Boyuan Yang)
  • [2024-01-20] mistune 3.0.2-1 MIGRATED to testing (Debian testing watch)
  • [2023-12-12] Accepted mistune 3.0.2-1 (source) into unstable (Julien Puydt)
  • [2023-07-17] mistune 2.0.4-2 MIGRATED to testing (Debian testing watch)
  • [2023-07-13] Accepted mistune 2.0.4-2 (source) into unstable (Bastian Germann) (signed by: bage@debian.org)
  • [2022-07-21] mistune 2.0.4-1 MIGRATED to testing (Debian testing watch)
  • [2022-07-19] Accepted mistune 2.0.4-1 (source) into unstable (Julien Puydt)
  • [2022-07-13] mistune 2.0.3-1 MIGRATED to testing (Debian testing watch)
  • [2022-07-13] mistune 2.0.3-1 MIGRATED to testing (Debian testing watch)
  • [2022-07-10] Accepted mistune 2.0.3-1 (source) into unstable (Julien Puydt)
  • [2022-04-14] mistune 2.0.2-1 MIGRATED to testing (Debian testing watch)
  • [2022-03-31] Accepted mistune 2.0.2-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2022-03-31] Accepted mistune 2.0.0.0+really2.0.0-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2022-01-20] mistune 2.0.0-1+really0.8.4-1 MIGRATED to testing (Debian testing watch)
  • [2022-01-12] Accepted mistune 2.0.0.0+really2.0.0-1~exp1 (source) into experimental (Pierre-Elliott Bécue)
  • [2022-01-11] Accepted mistune 2.0.0-1+really0.8.4-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2021-12-05] Accepted mistune 2.0.0-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2021-11-29] Accepted mistune 2.0.0~rc1-1~exp1 (source) into experimental (Pierre-Elliott Bécue)
  • [2021-08-27] mistune 0.8.4-5 MIGRATED to testing (Debian testing watch)
  • [2021-08-25] Accepted mistune 0.8.4-5 (source) into unstable (Sandro Tosi)
  • [2020-10-15] mistune 0.8.4-4 MIGRATED to testing (Debian testing watch)
  • [2020-10-12] Accepted mistune 0.8.4-4 (source) into unstable (Julien Puydt)
  • [2020-07-11] mistune 0.8.4-3 MIGRATED to testing (Debian testing watch)
  • [2020-07-08] Accepted mistune 0.8.4-3 (source) into unstable (Julien Puydt)
  • [2019-12-22] mistune 0.8.4-2 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.1.4-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing