Debian Package Tracker
Register | Log in
Subscribe

bettercap

Complete, modular, portable and easily extensible MITM framework

Choose email to subscribe with

general
  • source: bettercap (main)
  • version: 2.33.0-2
  • maintainer: Debian Security Tools (DMD)
  • uploaders: Francisco Vilmar Cardoso Ruviaro [DMD]
  • arch: any
  • std-ver: 4.7.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 2.32.0-1
  • stable: 2.33.0-1
  • testing: 2.33.0-2
  • unstable: 2.33.0-2
versioned links
  • 2.32.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.33.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.33.0-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • bettercap
action needed
A new upstream version is available: 2.41.7 high
A new upstream version 2.41.7 is available, you should consider packaging it.
Created: 2025-11-27 Last update: 2026-05-18 13:31
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2026-8275: A vulnerability was detected in bettercap up to 2.41.5. Affected by this vulnerability is the function ippReadChunkedBody of the file modules/zerogod/zerogod_ipp_primitives.go of the component zerogod IPP Service. Performing a manipulation results in integer coercion error. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is now public and may be used. The patch is named 3731d5576cffae9eefe3721cd46a40933304129f. To fix this issue, it is recommended to deploy a patch.
  • CVE-2026-8276: A flaw has been found in bettercap up to 2.41.5. Affected by this issue is some unknown functionality of the file modules/mysql_server/mysql_server.go of the component MySQL Server. Executing a manipulation can lead to integer coercion error. The attack can be launched remotely. The attack requires a high level of complexity. The exploitation is known to be difficult. The exploit has been published and may be used. This patch is called 0eaa375c5e5446bfba94a290eff92967a5deac9e. It is advisable to implement a patch to correct this issue.
Created: 2026-05-11 Last update: 2026-05-18 11:31
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2026-8275: A vulnerability was detected in bettercap up to 2.41.5. Affected by this vulnerability is the function ippReadChunkedBody of the file modules/zerogod/zerogod_ipp_primitives.go of the component zerogod IPP Service. Performing a manipulation results in integer coercion error. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is now public and may be used. The patch is named 3731d5576cffae9eefe3721cd46a40933304129f. To fix this issue, it is recommended to deploy a patch.
  • CVE-2026-8276: A flaw has been found in bettercap up to 2.41.5. Affected by this issue is some unknown functionality of the file modules/mysql_server/mysql_server.go of the component MySQL Server. Executing a manipulation can lead to integer coercion error. The attack can be launched remotely. The attack requires a high level of complexity. The exploitation is known to be difficult. The exploit has been published and may be used. This patch is called 0eaa375c5e5446bfba94a290eff92967a5deac9e. It is advisable to implement a patch to correct this issue.
Created: 2026-05-11 Last update: 2026-05-18 11:31
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2026-04-16 Last update: 2026-04-16 04:31
2 low-priority security issues in trixie low

There are 2 open security issues in trixie.

2 issues left for the package maintainer to handle:
  • CVE-2026-8275: (needs triaging) A vulnerability was detected in bettercap up to 2.41.5. Affected by this vulnerability is the function ippReadChunkedBody of the file modules/zerogod/zerogod_ipp_primitives.go of the component zerogod IPP Service. Performing a manipulation results in integer coercion error. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is now public and may be used. The patch is named 3731d5576cffae9eefe3721cd46a40933304129f. To fix this issue, it is recommended to deploy a patch.
  • CVE-2026-8276: (needs triaging) A flaw has been found in bettercap up to 2.41.5. Affected by this issue is some unknown functionality of the file modules/mysql_server/mysql_server.go of the component MySQL Server. Executing a manipulation can lead to integer coercion error. The attack can be launched remotely. The attack requires a high level of complexity. The exploitation is known to be difficult. The exploit has been published and may be used. This patch is called 0eaa375c5e5446bfba94a290eff92967a5deac9e. It is advisable to implement a patch to correct this issue.

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-05-11 Last update: 2026-05-18 11:31
2 low-priority security issues in bookworm low

There are 2 open security issues in bookworm.

2 issues left for the package maintainer to handle:
  • CVE-2026-8275: (needs triaging) A vulnerability was detected in bettercap up to 2.41.5. Affected by this vulnerability is the function ippReadChunkedBody of the file modules/zerogod/zerogod_ipp_primitives.go of the component zerogod IPP Service. Performing a manipulation results in integer coercion error. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is now public and may be used. The patch is named 3731d5576cffae9eefe3721cd46a40933304129f. To fix this issue, it is recommended to deploy a patch.
  • CVE-2026-8276: (needs triaging) A flaw has been found in bettercap up to 2.41.5. Affected by this issue is some unknown functionality of the file modules/mysql_server/mysql_server.go of the component MySQL Server. Executing a manipulation can lead to integer coercion error. The attack can be launched remotely. The attack requires a high level of complexity. The exploitation is known to be difficult. The exploit has been published and may be used. This patch is called 0eaa375c5e5446bfba94a290eff92967a5deac9e. It is advisable to implement a patch to correct this issue.

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-05-11 Last update: 2026-05-18 11:31
news
[rss feed]
  • [2026-04-18] bettercap 2.33.0-2 MIGRATED to testing (Debian testing watch)
  • [2026-04-15] Accepted bettercap 2.33.0-2 (source) into unstable (Francisco Vilmar Cardoso Ruviaro)
  • [2024-09-05] bettercap 2.33.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-08-18] Accepted bettercap 2.33.0-1 (source) into unstable (Francisco Vilmar Cardoso Ruviaro)
  • [2024-08-09] bettercap 2.32.0+git20240107.924ff57-5 MIGRATED to testing (Debian testing watch)
  • [2024-08-06] Accepted bettercap 2.32.0+git20240107.924ff57-5 (source) into unstable (Francisco Vilmar Cardoso Ruviaro)
  • [2024-08-06] Accepted bettercap 2.32.0+git20240107.924ff57-4 (source) into unstable (Francisco Vilmar Cardoso Ruviaro)
  • [2024-06-30] bettercap 2.32.0+git20240107.924ff57-3 MIGRATED to testing (Debian testing watch)
  • [2024-06-30] bettercap 2.32.0+git20240107.924ff57-3 MIGRATED to testing (Debian testing watch)
  • [2024-06-28] Accepted bettercap 2.32.0+git20240107.924ff57-3 (source) into unstable (Francisco Vilmar Cardoso Ruviaro)
  • [2024-06-20] bettercap 2.32.0+git20240107.924ff57-2 MIGRATED to testing (Debian testing watch)
  • [2024-06-20] bettercap 2.32.0+git20240107.924ff57-2 MIGRATED to testing (Debian testing watch)
  • [2024-06-17] Accepted bettercap 2.32.0+git20240107.924ff57-2 (source) into unstable (Francisco Vilmar Cardoso Ruviaro)
  • [2024-05-31] bettercap 2.32.0+git20240107.924ff57-1 MIGRATED to testing (Debian testing watch)
  • [2024-05-28] Accepted bettercap 2.32.0+git20240107.924ff57-1 (source) into unstable (Francisco Vilmar Cardoso Ruviaro)
  • [2024-05-27] Accepted bettercap 2.32.0+git20240107.924ff57-1~exp2 (source) into experimental (Francisco Vilmar Cardoso Ruviaro)
  • [2024-05-10] Accepted bettercap 2.32.0+git20240107.924ff57-1~exp1 (source) into experimental (Francisco Vilmar Cardoso Ruviaro)
  • [2023-07-27] bettercap 2.32.0-2 MIGRATED to testing (Debian testing watch)
  • [2023-07-27] bettercap 2.32.0-2 MIGRATED to testing (Debian testing watch)
  • [2023-07-25] Accepted bettercap 2.32.0-2 (source) into unstable (Francisco Vilmar Cardoso Ruviaro)
  • [2022-04-08] bettercap 2.32.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-05] Accepted bettercap 2.32.0-1 (source amd64) into unstable, unstable (Debian FTP Masters) (signed by: Francisco Vilmar Cardoso Ruviaro)
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.33.0-1build1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing