Debian Package Tracker
Register | Log in
Subscribe

node-body-parser

body parsing middleware - Node.js module

Choose email to subscribe with

general
  • source: node-body-parser (main)
  • version: 2.2.0+~1.19.6-3
  • maintainer: Debian Javascript Maintainers (archive) (DMD)
  • uploaders: Yadd [DMD]
  • arch: all
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.19.0-2
  • oldstable: 1.20.1+~1.19.2-1
  • stable: 1.20.3+~1.19.5-3
  • testing: 2.2.0+~1.19.6-3
  • unstable: 2.2.0+~1.19.6-3
versioned links
  • 1.19.0-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.20.1+~1.19.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.20.3+~1.19.5-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.2.0+~1.19.6-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • node-body-parser
action needed
Debci reports failed tests high
  • unstable: pass (log)
    The tests ran in 0:01:32
    Last run: 2025-11-05T19:56:19.000Z
    Previous status: unknown

  • testing: pass (log)
    The tests ran in 0:02:05
    Last run: 2025-10-31T01:37:12.000Z
    Previous status: unknown

  • stable: fail (log)
    The tests ran in 0:01:58
    Last run: 2025-11-09T18:01:32.000Z
    Previous status: unknown

Created: 2025-06-10 Last update: 2025-11-27 11:30
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2025-13466: body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.
Created: 2025-11-24 Last update: 2025-11-26 09:30
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2025-13466: body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.
Created: 2025-11-24 Last update: 2025-11-26 09:30
2 security issues in bullseye high

There are 2 open security issues in bullseye.

1 important issue:
  • CVE-2025-13466: body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.
1 issue postponed or untriaged:
  • CVE-2024-45590: (postponed; to be fixed through a stable update) body-parser is Node.js body parsing middleware. body-parser <1.20.3 is vulnerable to denial of service when url encoding is enabled. A malicious actor using a specially crafted payload could flood the server with a large number of requests, resulting in denial of service. This issue is patched in 1.20.3.
Created: 2025-11-24 Last update: 2025-11-26 09:30
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2025-10-28 Last update: 2025-10-28 09:31
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2025-13466: (needs triaging) body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-11-24 Last update: 2025-11-26 09:30
2 low-priority security issues in bookworm low

There are 2 open security issues in bookworm.

2 issues left for the package maintainer to handle:
  • CVE-2024-45590: (needs triaging) body-parser is Node.js body parsing middleware. body-parser <1.20.3 is vulnerable to denial of service when url encoding is enabled. A malicious actor using a specially crafted payload could flood the server with a large number of requests, resulting in denial of service. This issue is patched in 1.20.3.
  • CVE-2025-13466: (needs triaging) body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.

You can find information about how to handle these issues in the security team's documentation.

Created: 2024-09-12 Last update: 2025-11-26 09:30
news
[rss feed]
  • [2025-10-30] node-body-parser 2.2.0+~1.19.6-3 MIGRATED to testing (Debian testing watch)
  • [2025-10-28] node-body-parser 2.2.0+~1.19.6-2 MIGRATED to testing (Debian testing watch)
  • [2025-10-27] Accepted node-body-parser 2.2.0+~1.19.6-3 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2025-10-25] Accepted node-body-parser 2.2.0+~1.19.6-2 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2025-10-07] Accepted node-body-parser 2.2.0+~1.19.6-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2024-09-23] node-body-parser 1.20.3+~1.19.5-3 MIGRATED to testing (Debian testing watch)
  • [2024-09-16] Accepted node-body-parser 1.20.3+~1.19.5-3 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2024-09-16] Accepted node-body-parser 1.20.3+~1.19.5-2 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2024-09-14] Accepted node-body-parser 1.20.3+~1.19.5-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2023-11-19] node-body-parser 1.20.2+~1.19.5-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-17] Accepted node-body-parser 1.20.2+~1.19.5-1 (source) into unstable (Godwin Nweke) (signed by: Xavier Guimard)
  • [2022-10-18] node-body-parser 1.20.1+~1.19.2-1 MIGRATED to testing (Debian testing watch)
  • [2022-10-15] Accepted node-body-parser 1.20.1+~1.19.2-1 (source) into unstable (sandra uwah) (signed by: Xavier Guimard)
  • [2022-04-20] node-body-parser 1.20.0+~1.19.2-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-18] Accepted node-body-parser 1.20.0+~1.19.2-1 (source) into unstable (Israel Galadima) (signed by: Praveen Arimbrathodiyil)
  • [2022-02-21] node-body-parser 1.19.2+~1.19.2-1 MIGRATED to testing (Debian testing watch)
  • [2022-02-19] Accepted node-body-parser 1.19.2+~1.19.2-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-02-05] node-body-parser 1.19.1+~1.19.2-1 MIGRATED to testing (Debian testing watch)
  • [2022-02-03] Accepted node-body-parser 1.19.1+~1.19.2-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2021-10-25] node-body-parser 1.19.0-5 MIGRATED to testing (Debian testing watch)
  • [2021-10-23] Accepted node-body-parser 1.19.0-5 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2021-09-15] Accepted node-body-parser 1.19.0-4 (source all) into unstable (Jelmer Vernooij) (signed by: Jelmer Vernooij)
  • [2021-08-28] Accepted node-body-parser 1.19.0-3 (source all) into unstable (Jelmer Vernooij) (signed by: Jelmer Vernooij)
  • [2019-12-24] node-body-parser 1.19.0-2 MIGRATED to testing (Debian testing watch)
  • [2019-12-21] Accepted node-body-parser 1.19.0-2 (source) into unstable (Xavier Guimard)
  • [2019-10-30] node-body-parser 1.19.0-1 MIGRATED to testing (Debian testing watch)
  • [2019-10-28] Accepted node-body-parser 1.19.0-1 (source) into unstable (Xavier Guimard)
  • [2019-01-27] node-body-parser 1.18.3-2 MIGRATED to testing (Debian testing watch)
  • [2019-01-25] Accepted node-body-parser 1.18.3-2 (source all) into unstable (Xavier Guimard)
  • [2018-06-26] node-body-parser 1.18.3-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.20.3+~1.19.5-3

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing