Debian Package Tracker
Register | Log in
Subscribe

node-path-to-regexp

express style path to RegExp utility

Choose email to subscribe with

general
  • source: node-path-to-regexp (main)
  • version: 8.4.1-1
  • maintainer: Debian Javascript Maintainers (archive) (DMD)
  • uploaders: Yadd [DMD]
  • arch: all
  • std-ver: 4.7.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 6.2.0-1
  • oldstable: 6.2.1-1
  • stable: 6.3.0-1
  • testing: 8.4.1-1
  • unstable: 8.4.1-1
versioned links
  • 6.2.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.2.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.3.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.4.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • node-path-to-regexp
action needed
A new upstream version is available: 8.4.2 high
A new upstream version 8.4.2 is available, you should consider packaging it.
Created: 2026-04-04 Last update: 2026-04-13 20:00
2 low-priority security issues in trixie low

There are 2 open security issues in trixie.

2 issues left for the package maintainer to handle:
  • CVE-2026-4923: (needs triaging) Impact: When using multiple wildcards, combined with at least one parameter, a regular expression can be generated that is vulnerable to ReDoS. This backtracking vulnerability requires the second wildcard to be somewhere other than the end of the path. Unsafe examples: /*foo-*bar-:baz /*a-:b-*c-:d /x/*a-:b/*c/y Safe examples: /*foo-:bar /*foo-:bar-*baz Patches: Upgrade to version 8.4.0. Workarounds: If you are using multiple wildcard parameters, you can check the regex output with a tool such as https://makenowjust-labs.github.io/recheck/playground/ to confirm whether a path is vulnerable.
  • CVE-2026-4926: (needs triaging) Impact: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service. Patches: Fixed in version 8.4.0. Workarounds: Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-03-26 Last update: 2026-04-05 18:03
3 low-priority security issues in bookworm low

There are 3 open security issues in bookworm.

3 issues left for the package maintainer to handle:
  • CVE-2026-4923: (needs triaging) Impact: When using multiple wildcards, combined with at least one parameter, a regular expression can be generated that is vulnerable to ReDoS. This backtracking vulnerability requires the second wildcard to be somewhere other than the end of the path. Unsafe examples: /*foo-*bar-:baz /*a-:b-*c-:d /x/*a-:b/*c/y Safe examples: /*foo-:bar /*foo-:bar-*baz Patches: Upgrade to version 8.4.0. Workarounds: If you are using multiple wildcard parameters, you can check the regex output with a tool such as https://makenowjust-labs.github.io/recheck/playground/ to confirm whether a path is vulnerable.
  • CVE-2026-4926: (needs triaging) Impact: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service. Patches: Fixed in version 8.4.0. Workarounds: Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.
  • CVE-2024-45296: (needs triaging) path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a DoS. The bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For users of 0.1, upgrade to 0.1.10. All other users should upgrade to 8.0.0.

You can find information about how to handle these issues in the security team's documentation.

Created: 2024-09-12 Last update: 2026-04-05 18:03
news
[rss feed]
  • [2026-04-02] node-path-to-regexp 8.4.1-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-31] Accepted node-path-to-regexp 8.4.1-1 (source) into unstable (Xavier Guimard)
  • [2026-03-31] node-path-to-regexp 8.4.0-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-27] Accepted node-path-to-regexp 8.4.0-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2025-10-28] node-path-to-regexp 8.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-25] Accepted node-path-to-regexp 8.3.0-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2024-09-16] node-path-to-regexp 6.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-14] Accepted node-path-to-regexp 6.3.0-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-05-21] node-path-to-regexp 6.2.1-1 MIGRATED to testing (Debian testing watch)
  • [2022-05-19] Accepted node-path-to-regexp 6.2.1-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-05-03] node-path-to-regexp 6.2.0-3 MIGRATED to testing (Debian testing watch)
  • [2022-05-01] Accepted node-path-to-regexp 6.2.0-3 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2021-10-12] node-path-to-regexp 6.2.0-2 MIGRATED to testing (Debian testing watch)
  • [2021-10-10] Accepted node-path-to-regexp 6.2.0-2 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2020-11-01] node-path-to-regexp 6.2.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-10-29] Accepted node-path-to-regexp 6.2.0-1 (source) into unstable (Xavier Guimard)
  • [2020-05-03] node-path-to-regexp 6.1.0-3 MIGRATED to testing (Debian testing watch)
  • [2020-05-01] Accepted node-path-to-regexp 6.1.0-3 (source) into unstable (Xavier Guimard)
  • [2019-12-19] node-path-to-regexp 6.1.0-2 MIGRATED to testing (Debian testing watch)
  • [2019-12-16] Accepted node-path-to-regexp 6.1.0-2 (source) into unstable (Xavier Guimard)
  • [2019-12-04] Accepted node-path-to-regexp 6.1.0-1 (source) into experimental (Xavier Guimard)
  • [2019-10-24] node-path-to-regexp 3.1.0-1 MIGRATED to testing (Debian testing watch)
  • [2019-10-21] Accepted node-path-to-regexp 3.1.0-1 (source) into unstable (Xavier Guimard)
  • [2019-08-06] node-path-to-regexp 3.0.0-2 MIGRATED to testing (Debian testing watch)
  • [2019-08-04] Accepted node-path-to-regexp 3.0.0-2 (source) into unstable (Xavier Guimard)
  • [2019-02-09] node-path-to-regexp 3.0.0-1 MIGRATED to testing (Debian testing watch)
  • [2019-02-06] Accepted node-path-to-regexp 3.0.0-1 (source) into unstable (Xavier Guimard)
  • [2014-10-22] node-path-to-regexp 1.0.1-1 MIGRATED to testing (Britney)
  • [2014-10-11] Accepted node-path-to-regexp 1.0.1-1 (source all) into unstable (Leo Iannacone)
  • [2014-05-04] node-path-to-regexp 0.1.2-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 8.4.0-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing