Debian Package Tracker
Register | Log in
Subscribe

nats-server

High-Performance server for NATS.io (program)

Choose email to subscribe with

general
  • source: nats-server (main)
  • version: 2.12.4-1
  • maintainer: Debian Go Packaging Team (DMD)
  • uploaders: Dominik George [DMD]
  • arch: all any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 2.9.10-1
  • stable: 2.10.27-1
  • testing: 2.10.27-1
  • unstable: 2.12.4-1
versioned links
  • 2.9.10-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.10.27-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.12.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • golang-github-nats-io-nats-server-dev
  • nats-server
action needed
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2026-27571: NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. The WebSockets handling of NATS messages handles compressed messages via the WebSockets negotiated compression. Prior to versions 2.11.2 and 2.12.3, the implementation bound the memory size of a NATS message but did not independently bound the memory consumption of the memory stream when constructing a NATS message which might then fail validation for size reasons. An attacker can use a compression bomb to cause excessive memory consumption, often resulting in the operating system terminating the server process. The use of compression is negotiated before authentication, so this does not require valid NATS credentials to exploit. The fix, present in versions 2.11.2 and 2.12.3, was to bounds the decompression to fail once the message was too large, instead of continuing on. The vulnerability only affects deployments which use WebSockets and which expose the network port to untrusted end-points.
Created: 2026-02-25 Last update: 2026-03-02 08:00
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-27571: NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. The WebSockets handling of NATS messages handles compressed messages via the WebSockets negotiated compression. Prior to versions 2.11.2 and 2.12.3, the implementation bound the memory size of a NATS message but did not independently bound the memory consumption of the memory stream when constructing a NATS message which might then fail validation for size reasons. An attacker can use a compression bomb to cause excessive memory consumption, often resulting in the operating system terminating the server process. The use of compression is negotiated before authentication, so this does not require valid NATS credentials to exploit. The fix, present in versions 2.11.2 and 2.12.3, was to bounds the decompression to fail once the message was too large, instead of continuing on. The vulnerability only affects deployments which use WebSockets and which expose the network port to untrusted end-points.
Created: 2026-02-25 Last update: 2026-03-02 08:00
3 security issues in bookworm high

There are 3 open security issues in bookworm.

1 important issue:
  • CVE-2026-27571: NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. The WebSockets handling of NATS messages handles compressed messages via the WebSockets negotiated compression. Prior to versions 2.11.2 and 2.12.3, the implementation bound the memory size of a NATS message but did not independently bound the memory consumption of the memory stream when constructing a NATS message which might then fail validation for size reasons. An attacker can use a compression bomb to cause excessive memory consumption, often resulting in the operating system terminating the server process. The use of compression is negotiated before authentication, so this does not require valid NATS credentials to exploit. The fix, present in versions 2.11.2 and 2.12.3, was to bounds the decompression to fail once the message was too large, instead of continuing on. The vulnerability only affects deployments which use WebSockets and which expose the network port to untrusted end-points.
2 issues left for the package maintainer to handle:
  • CVE-2023-47090: (needs triaging) NATS nats-server before 2.9.23 and 2.10.x before 2.10.2 has an authentication bypass. An implicit $G user in an authorization block can sometimes be used for unauthenticated access, even when the intention of the configuration was for each user to have an account. The earliest affected version is 2.2.0.
  • CVE-2025-30215: (needs triaging) NATS-Server is a High-Performance server for NATS.io, the cloud and edge native messaging system. In versions starting from 2.2.0 but prior to 2.10.27 and 2.11.1, the management of JetStream assets happens with messages in the $JS. subject namespace in the system account; this is partially exposed into regular accounts to allow account holders to manage their assets. Some of the JS API requests were missing access controls, allowing any user with JS management permissions in any account to perform certain administrative actions on any JS asset in any other account. At least one of the unprotected APIs allows for data destruction. None of the affected APIs allow disclosing stream contents. This vulnerability is fixed in v2.11.1 or v2.10.27.

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-10-28 Last update: 2026-03-02 08:00
testing migrations
  • excuses:
    • Migrates after: golang-github-antithesishq-antithesis-sdk-go
    • Migration status for nats-server (2.10.27-1 to 2.12.4-1): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for golang-github-go-kit-kit/0.13.0-9: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for nats-server/2.12.4-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Lintian check waiting for test results - info
    • ∙ ∙ Too young, only 1 of 5 days old
    • ∙ ∙ Build-Depends(-Arch): nats-server golang-github-antithesishq-antithesis-sdk-go
    • ∙ ∙ Built-Using: nats-server golang-github-antithesishq-antithesis-sdk-go
    • ∙ ∙ Depends: nats-server golang-github-antithesishq-antithesis-sdk-go
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/n/nats-server.html
    • ∙ ∙ Reproduced on amd64
    • ∙ ∙ Reproduced on arm64
    • ∙ ∙ Reproduced on armhf
    • ∙ ∙ Reproduced on i386
    • ∙ ∙ Reproducibility check waiting for results on ppc64el
    • Not considered
news
[rss feed]
  • [2026-03-01] Accepted nats-server 2.12.4-1 (source) into unstable (Mathias Gibbens)
  • [2025-04-12] nats-server 2.10.27-1 MIGRATED to testing (Debian testing watch)
  • [2025-04-09] Accepted nats-server 2.10.27-1 (source) into unstable (Mathias Gibbens)
  • [2024-12-28] nats-server 2.10.24-1 MIGRATED to testing (Debian testing watch)
  • [2024-12-26] Accepted nats-server 2.10.24-1 (source) into unstable (Mathias Gibbens)
  • [2024-07-25] nats-server 2.10.18-1 MIGRATED to testing (Debian testing watch)
  • [2024-07-22] Accepted nats-server 2.10.18-1 (source) into unstable (Mathias Gibbens)
  • [2024-06-24] nats-server 2.10.16-1 MIGRATED to testing (Debian testing watch)
  • [2024-06-21] Accepted nats-server 2.10.16-1 (source) into unstable (Mathias Gibbens)
  • [2023-12-24] nats-server 2.10.7-1 MIGRATED to testing (Debian testing watch)
  • [2023-12-22] Accepted nats-server 2.10.7-1 (source) into unstable (Mathias Gibbens)
  • [2023-11-05] nats-server 2.10.4-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-05] nats-server 2.10.4-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-02] Accepted nats-server 2.10.4-1 (source) into unstable (Mathias Gibbens)
  • [2023-10-22] nats-server 2.10.3-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-15] Accepted nats-server 2.10.3-1 (source) into unstable (Mathias Gibbens)
  • [2023-09-26] nats-server 2.10.1-1 MIGRATED to testing (Debian testing watch)
  • [2023-09-24] Accepted nats-server 2.10.1-1 (source) into unstable (Mathias Gibbens)
  • [2023-07-10] nats-server 2.9.19-1 MIGRATED to testing (Debian testing watch)
  • [2023-07-08] Accepted nats-server 2.9.19-1 (source) into unstable (Mathias Gibbens)
  • [2022-12-26] nats-server 2.9.10-1 MIGRATED to testing (Debian testing watch)
  • [2022-12-24] Accepted nats-server 2.9.10-1 (source) into unstable (Mathias Gibbens)
  • [2022-11-29] nats-server 2.9.8-1 MIGRATED to testing (Debian testing watch)
  • [2022-11-26] Accepted nats-server 2.9.8-1 (source) into unstable (Mathias Gibbens)
  • [2022-06-07] Accepted nats-server 2.8.0-2 (source) into unstable (Mike Gabriel)
  • [2022-06-04] Accepted nats-server 2.8.0-1 (source all amd64) into unstable, unstable (Debian FTP Masters) (signed by: Dominik George)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.10.27-1build1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing