Debian Package Tracker
Register | Log in
Subscribe

lambdaisland-uri-clojure

pure Clojure URI library

Choose email to subscribe with

general
  • source: lambdaisland-uri-clojure (main)
  • version: 1.13.95-2
  • maintainer: Debian Clojure Maintainers (DMD)
  • uploaders: Louis-Philippe Véronneau [DMD]
  • arch: all
  • std-ver: 4.6.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 1.13.95-2
  • stable: 1.13.95-2
  • testing: 1.13.95-2
  • unstable: 1.13.95-2
versioned links
  • 1.13.95-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • liblambdaisland-uri-clojure
action needed
A new upstream version is available: 1.19.155 high
A new upstream version 1.19.155 is available, you should consider packaging it.
Created: 2025-11-27 Last update: 2026-04-08 03:30
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2023-28628: lambdaisland/uri is a pure Clojure/ClojureScript URI library. In versions prior to 1.14.120 `authority-regex` allows an attacker to send malicious URLs to be parsed by the `lambdaisland/uri` and return the wrong authority. This issue is similar to but distinct from CVE-2020-8910. The regex in question doesn't handle the backslash (`\`) character in the username correctly, leading to a wrong output. ex. a payload of `https://example.com\\@google.com` would return that the host is `google.com`, but the correct host should be `example.com`. Given that the library returns the wrong authority this may be abused to bypass host restrictions depending on how the library is used in an application. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Created: 2026-04-07 Last update: 2026-04-07 08:00
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2023-28628: lambdaisland/uri is a pure Clojure/ClojureScript URI library. In versions prior to 1.14.120 `authority-regex` allows an attacker to send malicious URLs to be parsed by the `lambdaisland/uri` and return the wrong authority. This issue is similar to but distinct from CVE-2020-8910. The regex in question doesn't handle the backslash (`\`) character in the username correctly, leading to a wrong output. ex. a payload of `https://example.com\\@google.com` would return that the host is `google.com`, but the correct host should be `example.com`. Given that the library returns the wrong authority this may be abused to bypass host restrictions depending on how the library is used in an application. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Created: 2026-04-07 Last update: 2026-04-07 08:00
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2023-28628: lambdaisland/uri is a pure Clojure/ClojureScript URI library. In versions prior to 1.14.120 `authority-regex` allows an attacker to send malicious URLs to be parsed by the `lambdaisland/uri` and return the wrong authority. This issue is similar to but distinct from CVE-2020-8910. The regex in question doesn't handle the backslash (`\`) character in the username correctly, leading to a wrong output. ex. a payload of `https://example.com\\@google.com` would return that the host is `google.com`, but the correct host should be `example.com`. Given that the library returns the wrong authority this may be abused to bypass host restrictions depending on how the library is used in an application. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Created: 2026-04-07 Last update: 2026-04-07 08:00
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2023-28628: lambdaisland/uri is a pure Clojure/ClojureScript URI library. In versions prior to 1.14.120 `authority-regex` allows an attacker to send malicious URLs to be parsed by the `lambdaisland/uri` and return the wrong authority. This issue is similar to but distinct from CVE-2020-8910. The regex in question doesn't handle the backslash (`\`) character in the username correctly, leading to a wrong output. ex. a payload of `https://example.com\\@google.com` would return that the host is `google.com`, but the correct host should be `example.com`. Given that the library returns the wrong authority this may be abused to bypass host restrictions depending on how the library is used in an application. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Created: 2026-04-07 Last update: 2026-04-07 08:00
debian/patches: 1 patch to forward upstream low

Among the 1 debian patch available in version 1.13.95-2 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-02-26 15:54
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.6.0).
Created: 2022-05-11 Last update: 2026-03-31 15:01
news
[rss feed]
  • [2022-10-02] lambdaisland-uri-clojure 1.13.95-2 MIGRATED to testing (Debian testing watch)
  • [2022-10-01] lambdaisland-uri-clojure REMOVED from testing (Debian testing watch)
  • [2022-02-19] lambdaisland-uri-clojure 1.13.95-2 MIGRATED to testing (Debian testing watch)
  • [2022-02-16] Accepted lambdaisland-uri-clojure 1.13.95-2 (source) into unstable (Louis-Philippe Véronneau)
  • [2022-02-16] Accepted lambdaisland-uri-clojure 1.13.95-1 (source all) into unstable, unstable (Debian FTP Masters) (signed by: Louis-Philippe Véronneau)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.13.95-2ubuntu1
  • patches for 1.13.95-2ubuntu1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing