Debian Package Tracker
Register | Log in
Subscribe

hugo

Fast and flexible Static Site Generator written in Go

Choose email to subscribe with

general
  • source: hugo (main)
  • version: 0.161.1-1
  • maintainer: Debian Go Packaging Team (DMD)
  • uploaders: Anthony Fok [DMD] – Dr. Tobias Quathamer [DMD]
  • arch: any
  • std-ver: 4.7.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.80.0-6
  • o-o-sec: 0.80.0-6+deb11u1
  • oldstable: 0.111.3-1
  • stable: 0.131.0-1
  • testing: 0.161.0-1
  • unstable: 0.161.1-1
versioned links
  • 0.80.0-6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.80.0-6+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.111.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.131.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.161.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.161.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • hugo (2 bugs: 0, 2, 0, 0)
action needed
Debci reports failed tests high
  • unstable: tmpfail (log)
    The tests ran in 0:00:05
    Last run: 2026-04-18T18:58:31.000Z
    Previous status: unknown

  • testing: pass (log)
    The tests ran in 0:17:48
    Last run: 2026-04-13T15:45:07.000Z
    Previous status: unknown

  • stable: fail (log)
    The tests ran in 0:02:51
    Last run: 2026-05-01T08:29:23.000Z
    Previous status: unknown

Created: 2025-02-02 Last update: 2026-05-15 20:01
3 security issues in trixie high

There are 3 open security issues in trixie.

1 important issue:
  • CVE-2026-44301: Hugo is a static site generator. From 0.43 to before 0.161.0, when building a Hugo site that uses Node-based asset pipelines (PostCSS, Babel, TailwindCSS), Hugo invoked the configured Node tools without restrictions on file system access. As a result, executing hugo against an untrusted site could allow code running through these tools to read or write files outside the project's working directory. Users who do not use PostCSS, Babel, or TailwindCSS, or who only build trusted sites, are not affected. This vulnerability is fixed in 0.161.0.
2 issues left for the package maintainer to handle:
  • CVE-2024-55601: (needs triaging) Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.139.4, some HTML attributes in Markdown in the internal templates listed below not escaped in internal render hooks. Those whoa re impacted are Hugo users who do not trust their Markdown content files and are using one or more of these templates: `_default/_markup/render-link.html` from `v0.123.0`; `_default/_markup/render-image.html` from `v0.123.0`; `_default/_markup/render-table.html` from `v0.134.0`; and/or `shortcodes/youtube.html` from `v0.125.0`. This issue is patched in v0.139.4. As a workaround, one may replace an affected component with user defined templates or disable the internal templates.
  • CVE-2026-35166: (needs triaging) Hugo is a static site generator. From 0.60.0 to before 0.159.2, links and image links in the default markdown to HTML renderer are not properly escaped. Hugo users who trust their Markdown content or have custom render hooks for links and images are not affected. This vulnerability is fixed in 0.159.2.

You can find information about how to handle these issues in the security team's documentation.

Created: 2024-12-11 Last update: 2026-05-13 13:00
2 security issues in bookworm high

There are 2 open security issues in bookworm.

1 important issue:
  • CVE-2026-44301: Hugo is a static site generator. From 0.43 to before 0.161.0, when building a Hugo site that uses Node-based asset pipelines (PostCSS, Babel, TailwindCSS), Hugo invoked the configured Node tools without restrictions on file system access. As a result, executing hugo against an untrusted site could allow code running through these tools to read or write files outside the project's working directory. Users who do not use PostCSS, Babel, or TailwindCSS, or who only build trusted sites, are not affected. This vulnerability is fixed in 0.161.0.
1 issue left for the package maintainer to handle:
  • CVE-2026-35166: (needs triaging) Hugo is a static site generator. From 0.60.0 to before 0.159.2, links and image links in the default markdown to HTML renderer are not properly escaped. Hugo users who trust their Markdown content or have custom render hooks for links and images are not affected. This vulnerability is fixed in 0.159.2.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-04-06 Last update: 2026-05-13 13:00
2 security issues in bullseye high

There are 2 open security issues in bullseye.

1 important issue:
  • CVE-2026-44301: Hugo is a static site generator. From 0.43 to before 0.161.0, when building a Hugo site that uses Node-based asset pipelines (PostCSS, Babel, TailwindCSS), Hugo invoked the configured Node tools without restrictions on file system access. As a result, executing hugo against an untrusted site could allow code running through these tools to read or write files outside the project's working directory. Users who do not use PostCSS, Babel, or TailwindCSS, or who only build trusted sites, are not affected. This vulnerability is fixed in 0.161.0.
1 issue postponed or untriaged:
  • CVE-2026-35166: (postponed; to be fixed through a stable update) Hugo is a static site generator. From 0.60.0 to before 0.159.2, links and image links in the default markdown to HTML renderer are not properly escaped. Hugo users who trust their Markdown content or have custom render hooks for links and images are not affected. This vulnerability is fixed in 0.159.2.
Created: 2026-05-13 Last update: 2026-05-13 13:00
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 2-day delay is over. Check why.
Created: 2026-05-09 Last update: 2026-05-15 20:32
testing migrations
  • excuses:
    • Migration status for hugo (0.161.0-1 to 0.161.1-1): Will attempt migration (Any information below is purely informational)
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/h/hugo.html
    • ∙ ∙ Autopkgtest for hugo/0.161.1-1: amd64: Pass, arm64: Pass, i386: Pass, loong64: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Reproduced on amd64 - info
    • ∙ ∙ Reproduced on arm64 - info
    • ∙ ∙ Reproduced on armhf - info
    • ∙ ∙ Reproduced on i386 - info
    • ∙ ∙ Required age reduced by 3 days because of autopkgtest
    • ∙ ∙ 12 days old (needed 2 days)
news
[rss feed]
  • [2026-05-04] Accepted hugo 0.161.1-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-05-04] hugo 0.161.0-1 MIGRATED to testing (Debian testing watch)
  • [2026-04-28] Accepted hugo 0.161.0-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-04-14] hugo 0.160.1-1 MIGRATED to testing (Debian testing watch)
  • [2026-04-11] hugo 0.160.0-2 MIGRATED to testing (Debian testing watch)
  • [2026-04-10] Accepted hugo 0.160.1-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-04-08] Accepted hugo 0.160.0-2 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-04-07] Accepted hugo 0.160.0-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-04-06] hugo 0.159.2-1 MIGRATED to testing (Debian testing watch)
  • [2026-04-03] Accepted hugo 0.159.2-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-04-03] hugo 0.159.1-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-30] Accepted hugo 0.159.1-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-03-28] hugo 0.159.0-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-26] Accepted hugo 0.159.0-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-03-22] hugo 0.158.0-3 MIGRATED to testing (Debian testing watch)
  • [2026-03-20] Accepted hugo 0.158.0-3 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-03-19] Accepted hugo 0.158.0-2 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-03-19] Accepted hugo 0.158.0-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-03-04] hugo 0.157.0-3 MIGRATED to testing (Debian testing watch)
  • [2026-02-28] Accepted hugo 0.157.0-3 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-02-28] Accepted hugo 0.157.0-2 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-02-27] Accepted hugo 0.157.0-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-02-14] Accepted hugo 0.155.3-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-02-07] Accepted hugo 0.155.2-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-01-30] Accepted hugo 0.155.1-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-01-20] hugo 0.154.5-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-14] hugo 0.154.3-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-13] Accepted hugo 0.154.5-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-01-07] Accepted hugo 0.154.3-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2026-01-06] Accepted hugo 0.154.2-2 (source) into unstable (Dr. Tobias Quathamer)
  • 1
  • 2
bugs [bug history graph]
  • all: 3
  • RC: 0
  • I&N: 3
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.154.5-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing