Debian Package Tracker
Register | Log in
Subscribe

composer

dependency manager for PHP

Choose email to subscribe with

general
  • source: composer (main)
  • version: 2.9.7-1
  • maintainer: Debian PHP PEAR Maintainers (archive) (DMD)
  • uploaders: David Prévot [DMD]
  • arch: all
  • std-ver: 4.7.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.0.9-2+deb11u4
  • o-o-sec: 2.0.9-2+deb11u4
  • oldstable: 2.5.5-1+deb12u3
  • old-sec: 2.5.5-1+deb12u2
  • stable: 2.8.8-1+deb13u1
  • testing: 2.9.7-1
  • unstable: 2.9.7-1
  • exp: 2.10.0~rc1-2
versioned links
  • 2.0.9-2+deb11u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.5.5-1+deb12u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.5.5-1+deb12u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.8.8-1+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.9.7-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.10.0~rc1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • composer
action needed
Marked for autoremoval on 17 May due to fonts-jetbrains-mono, kotlin, kotlinx-atomicfu, kotlinx-coroutines: #1131648, #1131656, #1131657, #1131658 high
Version 2.9.7-1 of composer is marked for autoremoval from testing on Sun 17 May 2026. It depends (transitively) on fonts-jetbrains-mono, kotlin, kotlinx-atomicfu, kotlinx-coroutines, affected by #1131648, #1131656, #1131657, #1131658. You should try to prevent the removal by fixing these RC bugs.
Created: 2026-03-27 Last update: 2026-04-25 23:03
4 security issues in bullseye high

There are 4 open security issues in bullseye.

2 important issues:
  • CVE-2026-40176: Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::generateP4Command() method, which constructs shell commands by interpolating user-supplied Perforce connection parameters (port, user, client) without proper escaping. An attacker can inject arbitrary commands through these values in a malicious composer.json declaring a Perforce VCS repository, leading to command execution in the context of the user running Composer, even if Perforce is not installed. VCS repositories are only loaded from the root composer.json or the composer config directory, so this cannot be exploited through composer.json files of packages installed as dependencies. Users are at risk if they run Composer commands on untrusted projects with attacker-supplied composer.json files. This issue has been fixed in Composer 2.2.27 (2.2 LTS) and 2.9.6 (mainline).
  • CVE-2026-40261: Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::syncCodeBase() method, which appends the $sourceReference parameter to a shell command without proper escaping, and additionally in the Perforce::generateP4Command() method as in GHSA-wg36-wvj6-r67p / CVE-2026-40176, which interpolates user-supplied Perforce connection parameters (port, user, client) from the source url field without proper escaping. An attacker can inject arbitrary commands through crafted source reference or source url values containing shell metacharacters, even if Perforce is not installed. Unlike CVE-2026-40176, the source reference and url are provided as part of package metadata, meaning any compromised or malicious Composer repository can serve package metadata declaring perforce as a source type with malicious values. This vulnerability is exploitable when installing or updating dependencies from source, including the default behavior when installing dev-prefixed versions. This issue has been fixed in Composer 2.2.27 (2.2 LTS) and 2.9.6 (mainline). If developers are unable to immediately update, they can avoid installing dependencies from source by using --prefer-dist or the preferred-install: dist config setting, and only use trusted Composer repositories as a workaround.
2 issues postponed or untriaged:
  • CVE-2023-43655: (needs triaging) Composer is a dependency manager for PHP. Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be subject to a remote code execution vulnerability if PHP also has `register_argc_argv` enabled in php.ini. Versions 2.6.4, 2.2.22 and 1.10.27 patch this vulnerability. Users are advised to upgrade. Users unable to upgrade should make sure `register_argc_argv` is disabled in php.ini, and avoid publishing composer.phar to the web as this is not best practice.
  • CVE-2025-67746: (postponed; to be fixed through a stable update) Composer is a dependency manager for PHP. In versions on the 2.x branch prior to 2.2.26 and 2.9.3, attackers controlling remote sources that Composer downloads from might in some way inject ANSI control characters in the terminal output of various Composer commands, causing mangled output and potentially leading to confusion or DoS of the terminal application. There is no proven exploit and this has thus a low severity but we still publish a CVE as it has potential for abuse, and we want to be on the safe side informing users that they should upgrade. Versions 2.2.26 and 2.9.3 contain a patch for the issue.
Created: 2026-04-15 Last update: 2026-04-22 10:48
2 low-priority security issues in trixie low

There are 2 open security issues in trixie.

2 issues left for the package maintainer to handle:
  • CVE-2026-40176: (needs triaging) Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::generateP4Command() method, which constructs shell commands by interpolating user-supplied Perforce connection parameters (port, user, client) without proper escaping. An attacker can inject arbitrary commands through these values in a malicious composer.json declaring a Perforce VCS repository, leading to command execution in the context of the user running Composer, even if Perforce is not installed. VCS repositories are only loaded from the root composer.json or the composer config directory, so this cannot be exploited through composer.json files of packages installed as dependencies. Users are at risk if they run Composer commands on untrusted projects with attacker-supplied composer.json files. This issue has been fixed in Composer 2.2.27 (2.2 LTS) and 2.9.6 (mainline).
  • CVE-2026-40261: (needs triaging) Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::syncCodeBase() method, which appends the $sourceReference parameter to a shell command without proper escaping, and additionally in the Perforce::generateP4Command() method as in GHSA-wg36-wvj6-r67p / CVE-2026-40176, which interpolates user-supplied Perforce connection parameters (port, user, client) from the source url field without proper escaping. An attacker can inject arbitrary commands through crafted source reference or source url values containing shell metacharacters, even if Perforce is not installed. Unlike CVE-2026-40176, the source reference and url are provided as part of package metadata, meaning any compromised or malicious Composer repository can serve package metadata declaring perforce as a source type with malicious values. This vulnerability is exploitable when installing or updating dependencies from source, including the default behavior when installing dev-prefixed versions. This issue has been fixed in Composer 2.2.27 (2.2 LTS) and 2.9.6 (mainline). If developers are unable to immediately update, they can avoid installing dependencies from source by using --prefer-dist or the preferred-install: dist config setting, and only use trusted Composer repositories as a workaround.

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-04-15 Last update: 2026-04-22 10:48
debian/patches: 13 patches to forward upstream low

Among the 17 debian patches available in version 2.9.7-1 of the package, we noticed the following issues:

  • 13 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-04-15 22:30
news
[rss feed]
  • [2026-04-19] Accepted composer 2.10.0~rc1-2 (source) into experimental (David Prévot)
  • [2026-04-17] composer 2.9.7-1 MIGRATED to testing (Debian testing watch)
  • [2026-04-15] Accepted composer 2.9.7-1 (source) into unstable (David Prévot)
  • [2026-04-06] Accepted composer 2.10.0~rc1-1 (source) into experimental (David Prévot)
  • [2026-02-01] composer 2.9.5-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-30] Accepted composer 2.9.5-1 (source) into unstable (David Prévot)
  • [2026-01-27] composer 2.9.4-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-25] Accepted composer 2.9.4-1 (source) into unstable (David Prévot)
  • [2026-01-02] composer 2.9.3-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-01] Accepted composer 2.5.5-1+deb12u3 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: David Prévot)
  • [2026-01-01] Accepted composer 2.8.8-1+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: David Prévot)
  • [2025-12-30] Accepted composer 2.9.3-1 (source) into unstable (David Prévot)
  • [2025-11-26] composer 2.9.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-24] Accepted composer 2.9.2-1 (source) into unstable (David Prévot)
  • [2025-11-18] composer 2.9.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-15] Accepted composer 2.9.1-1 (source) into unstable (David Prévot)
  • [2025-11-13] composer 2.9.0~rc1-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-10] Accepted composer 2.9.0~rc1-1 (source) into unstable (David Prévot)
  • [2025-09-25] composer 2.8.12-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-23] Accepted composer 2.8.12-1 (source) into unstable (David Prévot)
  • [2025-09-02] composer 2.8.11-2 MIGRATED to testing (Debian testing watch)
  • [2025-08-29] Accepted composer 2.8.11-2 (source) into unstable (David Prévot)
  • [2025-08-29] composer 2.8.11-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-26] Accepted composer 2.8.11-1 (source) into unstable (David Prévot)
  • [2025-07-13] Accepted composer 2.8.10-1 (source) into experimental (David Prévot)
  • [2025-05-14] Accepted composer 2.8.9-1 (source) into experimental (David Prévot)
  • [2025-04-11] composer 2.8.8-1 MIGRATED to testing (Debian testing watch)
  • [2025-04-06] Accepted composer 2.8.8-1 (source) into unstable (David Prévot)
  • [2025-03-03] composer 2.8.6-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-27] Accepted composer 2.8.6-1 (source) into unstable (David Prévot)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, exp, reproducibility
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.9.5-1
  • 2 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing