Debian Package Tracker
Register | Log in
Subscribe

node-path-to-regexp

express style path to RegExp utility

Choose email to subscribe with

general
  • source: node-path-to-regexp (main)
  • version: 8.4.2-1
  • maintainer: Debian Javascript Maintainers (archive) (DMD)
  • uploaders: Yadd [DMD]
  • arch: all
  • std-ver: 4.7.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 6.2.0-1
  • oldstable: 6.2.1-1
  • stable: 6.3.0-1
  • testing: 8.4.1-1
  • unstable: 8.4.2-1
versioned links
  • 6.2.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.2.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.3.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.4.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.4.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • node-path-to-regexp
action needed
2 low-priority security issues in trixie low

There are 2 open security issues in trixie.

2 issues left for the package maintainer to handle:
  • CVE-2026-4923: (needs triaging) Impact: When using multiple wildcards, combined with at least one parameter, a regular expression can be generated that is vulnerable to ReDoS. This backtracking vulnerability requires the second wildcard to be somewhere other than the end of the path. Unsafe examples: /*foo-*bar-:baz /*a-:b-*c-:d /x/*a-:b/*c/y Safe examples: /*foo-:bar /*foo-:bar-*baz Patches: Upgrade to version 8.4.0. Workarounds: If you are using multiple wildcard parameters, you can check the regex output with a tool such as https://makenowjust-labs.github.io/recheck/playground/ to confirm whether a path is vulnerable.
  • CVE-2026-4926: (needs triaging) Impact: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service. Patches: Fixed in version 8.4.0. Workarounds: Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-03-26 Last update: 2026-05-03 00:00
3 low-priority security issues in bookworm low

There are 3 open security issues in bookworm.

3 issues left for the package maintainer to handle:
  • CVE-2026-4923: (needs triaging) Impact: When using multiple wildcards, combined with at least one parameter, a regular expression can be generated that is vulnerable to ReDoS. This backtracking vulnerability requires the second wildcard to be somewhere other than the end of the path. Unsafe examples: /*foo-*bar-:baz /*a-:b-*c-:d /x/*a-:b/*c/y Safe examples: /*foo-:bar /*foo-:bar-*baz Patches: Upgrade to version 8.4.0. Workarounds: If you are using multiple wildcard parameters, you can check the regex output with a tool such as https://makenowjust-labs.github.io/recheck/playground/ to confirm whether a path is vulnerable.
  • CVE-2026-4926: (needs triaging) Impact: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service. Patches: Fixed in version 8.4.0. Workarounds: Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.
  • CVE-2024-45296: (needs triaging) path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a DoS. The bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For users of 0.1, upgrade to 0.1.10. All other users should upgrade to 8.0.0.

You can find information about how to handle these issues in the security team's documentation.

Created: 2024-09-12 Last update: 2026-05-03 00:00
testing migrations
  • excuses:
    • Migration status for node-path-to-regexp (8.4.1-1 to 8.4.2-1): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for node-express/5.1.0+~cs12.3.3-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for node-path-to-regexp/8.4.2-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for node-sinon/21.0.3+ds1+~cs93.2.9-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Failed (not a regression) ♻ (reference ♻), s390x: Test triggered
    • ∙ ∙ Autopkgtest for vue-router.js/3.6.5~ds1-3: amd64: No tests, superficial or marked flaky ♻, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻, ppc64el: No tests, superficial or marked flaky ♻, riscv64: No tests, superficial or marked flaky ♻, s390x: Test triggered
    • ∙ ∙ Too young, only 1 of 5 days old
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/n/node-path-to-regexp.html
    • ∙ ∙ Reproduced on amd64
    • ∙ ∙ Reproduced on arm64
    • ∙ ∙ Reproduced on armhf
    • ∙ ∙ Reproduced on i386
    • ∙ ∙ Reproduced on ppc64el
    • Not considered
news
[rss feed]
  • [2026-05-02] Accepted node-path-to-regexp 8.4.2-1 (source) into unstable (Xavier Guimard)
  • [2026-04-02] node-path-to-regexp 8.4.1-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-31] Accepted node-path-to-regexp 8.4.1-1 (source) into unstable (Xavier Guimard)
  • [2026-03-31] node-path-to-regexp 8.4.0-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-27] Accepted node-path-to-regexp 8.4.0-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2025-10-28] node-path-to-regexp 8.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-25] Accepted node-path-to-regexp 8.3.0-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2024-09-16] node-path-to-regexp 6.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-14] Accepted node-path-to-regexp 6.3.0-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-05-21] node-path-to-regexp 6.2.1-1 MIGRATED to testing (Debian testing watch)
  • [2022-05-19] Accepted node-path-to-regexp 6.2.1-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-05-03] node-path-to-regexp 6.2.0-3 MIGRATED to testing (Debian testing watch)
  • [2022-05-01] Accepted node-path-to-regexp 6.2.0-3 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2021-10-12] node-path-to-regexp 6.2.0-2 MIGRATED to testing (Debian testing watch)
  • [2021-10-10] Accepted node-path-to-regexp 6.2.0-2 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2020-11-01] node-path-to-regexp 6.2.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-10-29] Accepted node-path-to-regexp 6.2.0-1 (source) into unstable (Xavier Guimard)
  • [2020-05-03] node-path-to-regexp 6.1.0-3 MIGRATED to testing (Debian testing watch)
  • [2020-05-01] Accepted node-path-to-regexp 6.1.0-3 (source) into unstable (Xavier Guimard)
  • [2019-12-19] node-path-to-regexp 6.1.0-2 MIGRATED to testing (Debian testing watch)
  • [2019-12-16] Accepted node-path-to-regexp 6.1.0-2 (source) into unstable (Xavier Guimard)
  • [2019-12-04] Accepted node-path-to-regexp 6.1.0-1 (source) into experimental (Xavier Guimard)
  • [2019-10-24] node-path-to-regexp 3.1.0-1 MIGRATED to testing (Debian testing watch)
  • [2019-10-21] Accepted node-path-to-regexp 3.1.0-1 (source) into unstable (Xavier Guimard)
  • [2019-08-06] node-path-to-regexp 3.0.0-2 MIGRATED to testing (Debian testing watch)
  • [2019-08-04] Accepted node-path-to-regexp 3.0.0-2 (source) into unstable (Xavier Guimard)
  • [2019-02-09] node-path-to-regexp 3.0.0-1 MIGRATED to testing (Debian testing watch)
  • [2019-02-06] Accepted node-path-to-regexp 3.0.0-1 (source) into unstable (Xavier Guimard)
  • [2014-10-22] node-path-to-regexp 1.0.1-1 MIGRATED to testing (Britney)
  • [2014-10-11] Accepted node-path-to-regexp 1.0.1-1 (source all) into unstable (Leo Iannacone)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 8.4.0-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing