Debian Package Tracker
Register | Log in
Subscribe

eslint

AST-based pattern checker for JavaScript

Choose email to subscribe with

general
  • source: eslint (main)
  • version: 6.4.0~dfsg+~6.1.9-12
  • maintainer: Debian Javascript Maintainers (archive) (DMD)
  • uploaders: Jonas Smedegaard [DMD]
  • arch: all
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 5.16.0~dfsg+~4.16.8-5
  • oldstable: 6.4.0~dfsg+~6.1.9-7
  • stable: 6.4.0~dfsg+~6.1.9-12
  • testing: 6.4.0~dfsg+~6.1.9-12
  • unstable: 6.4.0~dfsg+~6.1.9-12
versioned links
  • 5.16.0~dfsg+~4.16.8-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.4.0~dfsg+~6.1.9-7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.4.0~dfsg+~6.1.9-12: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • eslint (5 bugs: 0, 3, 2, 0)
action needed
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2025-50537: Stack overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in eslint/lib/shared/serialization.js. The exploit is triggered via the RuleTester.run() method, which validates test cases and checks for duplicates. During validation, the internal function checkDuplicateTestCase() is called, which in turn uses the isSerializable() function for serialization checks. When a circular reference object is passed in, isSerializable() enters infinite recursion, ultimately causing a stack overflow.
Created: 2026-01-26 Last update: 2026-01-27 05:01
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2025-50537: Stack overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in eslint/lib/shared/serialization.js. The exploit is triggered via the RuleTester.run() method, which validates test cases and checks for duplicates. During validation, the internal function checkDuplicateTestCase() is called, which in turn uses the isSerializable() function for serialization checks. When a circular reference object is passed in, isSerializable() enters infinite recursion, ultimately causing a stack overflow.
Created: 2026-01-26 Last update: 2026-01-27 05:01
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2025-50537: Stack overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in eslint/lib/shared/serialization.js. The exploit is triggered via the RuleTester.run() method, which validates test cases and checks for duplicates. During validation, the internal function checkDuplicateTestCase() is called, which in turn uses the isSerializable() function for serialization checks. When a circular reference object is passed in, isSerializable() enters infinite recursion, ultimately causing a stack overflow.
Created: 2026-01-26 Last update: 2026-01-27 05:01
1 security issue in bullseye high

There is 1 open security issue in bullseye.

1 important issue:
  • CVE-2025-50537: Stack overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in eslint/lib/shared/serialization.js. The exploit is triggered via the RuleTester.run() method, which validates test cases and checks for duplicates. During validation, the internal function checkDuplicateTestCase() is called, which in turn uses the isSerializable() function for serialization checks. When a circular reference object is passed in, isSerializable() enters infinite recursion, ultimately causing a stack overflow.
Created: 2026-01-26 Last update: 2026-01-27 05:01
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2025-50537: Stack overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in eslint/lib/shared/serialization.js. The exploit is triggered via the RuleTester.run() method, which validates test cases and checks for duplicates. During validation, the internal function checkDuplicateTestCase() is called, which in turn uses the isSerializable() function for serialization checks. When a circular reference object is passed in, isSerializable() enters infinite recursion, ultimately causing a stack overflow.
Created: 2026-01-26 Last update: 2026-01-27 05:01
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug (2 if counting merged bugs), consider including or untagging them.
Created: 2025-01-06 Last update: 2026-02-03 02:01
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2025-12-02 Last update: 2026-02-03 01:31
lintian reports 6 warnings normal
Lintian reports 6 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2023-12-15 Last update: 2024-07-30 04:39
debian/patches: 7 patches to forward upstream low

Among the 34 debian patches available in version 6.4.0~dfsg+~6.1.9-12 of the package, we noticed the following issues:

  • 7 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2024-06-09 19:33
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.7.0).
Created: 2025-02-21 Last update: 2025-12-23 20:00
news
[rss feed]
  • [2024-06-11] eslint 6.4.0~dfsg+~6.1.9-12 MIGRATED to testing (Debian testing watch)
  • [2024-06-09] Accepted eslint 6.4.0~dfsg+~6.1.9-12 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2023-12-18] eslint 6.4.0~dfsg+~6.1.9-11 MIGRATED to testing (Debian testing watch)
  • [2023-12-14] Accepted eslint 6.4.0~dfsg+~6.1.9-11 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2023-12-14] Accepted eslint 6.4.0~dfsg+~6.1.9-10 (source all) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2023-12-09] Accepted eslint 6.4.0~dfsg+~6.1.9-9 (source) into experimental (Yadd) (signed by: Xavier Guimard)
  • [2023-12-08] Accepted eslint 6.4.0~dfsg+~6.1.9-8 (source) into experimental (Yadd) (signed by: Xavier Guimard)
  • [2022-06-27] eslint 6.4.0~dfsg+~6.1.9-7 MIGRATED to testing (Debian testing watch)
  • [2022-06-27] eslint 6.4.0~dfsg+~6.1.9-7 MIGRATED to testing (Debian testing watch)
  • [2022-06-10] Accepted eslint 6.4.0~dfsg+~6.1.9-7 (source) into unstable (Jonas Smedegaard)
  • [2022-06-10] Accepted eslint 6.4.0~dfsg+~6.1.9-6 (source) into unstable (Jonas Smedegaard)
  • [2022-03-29] eslint 6.4.0~dfsg+~6.1.9-5 MIGRATED to testing (Debian testing watch)
  • [2022-03-27] Accepted eslint 6.4.0~dfsg+~6.1.9-5 (source) into unstable (Jonas Smedegaard)
  • [2022-03-02] eslint 6.4.0~dfsg+~6.1.9-4 MIGRATED to testing (Debian testing watch)
  • [2022-02-27] Accepted eslint 6.4.0~dfsg+~6.1.9-4 (source) into unstable (Jonas Smedegaard)
  • [2022-02-08] eslint 6.4.0~dfsg+~6.1.9-2 MIGRATED to testing (Debian testing watch)
  • [2022-02-01] Accepted eslint 6.4.0~dfsg+~6.1.9-2 (source) into unstable (Jonas Smedegaard)
  • [2022-01-30] Accepted eslint 6.4.0~dfsg+~6.1.9-1 (source) into experimental (Jonas Smedegaard)
  • [2022-01-30] Accepted eslint 6.1.0~dfsg+~6.1.9-1 (source) into experimental (Jonas Smedegaard)
  • [2021-12-29] eslint 5.16.0~dfsg+~4.16.8-9 MIGRATED to testing (Debian testing watch)
  • [2021-12-07] Accepted eslint 5.16.0~dfsg+~4.16.8-9 (source) into unstable (Jonas Smedegaard)
  • [2021-11-27] eslint 5.16.0~dfsg+~4.16.8-8 MIGRATED to testing (Debian testing watch)
  • [2021-11-25] Accepted eslint 5.16.0~dfsg+~4.16.8-8 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2021-11-09] eslint 5.16.0~dfsg+~4.16.8-7 MIGRATED to testing (Debian testing watch)
  • [2021-11-07] Accepted eslint 5.16.0~dfsg+~4.16.8-7 (source) into unstable (Jonas Smedegaard)
  • [2021-09-26] eslint 5.16.0~dfsg+~4.16.8-6 MIGRATED to testing (Debian testing watch)
  • [2021-09-23] Accepted eslint 5.16.0~dfsg+~4.16.8-6 (source) into unstable (Jonas Smedegaard)
  • [2021-02-09] eslint 5.16.0~dfsg+~4.16.8-5 MIGRATED to testing (Debian testing watch)
  • [2021-02-06] Accepted eslint 5.16.0~dfsg+~4.16.8-5 (source) into unstable (Jonas Smedegaard)
  • [2021-01-07] eslint 5.16.0~dfsg+~4.16.8-4 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 9 10
  • RC: 1
  • I&N: 6 7
  • M&W: 2
  • F&P: 0
  • patch: 1 2
links
  • homepage
  • lintian (0, 6)
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 6.4.0~dfsg+~6.1.9-12

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing