Debian Package Tracker
Register | Log in
Subscribe

node-uuid

simple and fast RFC9562 UUID generation - Node.js module

Choose email to subscribe with

general
  • source: node-uuid (main)
  • version: 14.0.0+~11.0.0-1
  • maintainer: Debian Javascript Maintainers (archive) (DMD)
  • uploaders: Pirate Praveen [DMD]
  • arch: all
  • std-ver: 4.7.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 8.3.2+~8.3.0-4
  • oldstable: 8.3.2+~8.3.3-3
  • stable: 8.3.2+~8.3.4-1
  • testing: 8.3.2+~8.3.4-3
  • unstable: 14.0.0+~11.0.0-1
versioned links
  • 8.3.2+~8.3.0-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.3.2+~8.3.3-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.3.2+~8.3.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.3.2+~8.3.4-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 14.0.0+~11.0.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • node-uuid
action needed
2 security issues in trixie high

There are 2 open security issues in trixie.

2 important issues:
  • CVE-2026-41907: uuid is for the creation of RFC9562 (formerly RFC4122) UUIDs. Prior to 14.0.0, v3, v5, and v6 accept external output buffers but do not reject out-of-range writes (small buf or large offset). This allows silent partial writes into caller-provided buffers. This vulnerability is fixed in 14.0.0.
  • CVE-2026-41988: uuid before 14.0.0 can make unexpected writes when external output buffers are used, and the UUID version is 3, 5, or 6. In particular, UUID version 4, which is very commonly used, is unaffected by this issue.
Created: 2026-04-23 Last update: 2026-04-25 15:16
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2026-41907: uuid is for the creation of RFC9562 (formerly RFC4122) UUIDs. Prior to 14.0.0, v3, v5, and v6 accept external output buffers but do not reject out-of-range writes (small buf or large offset). This allows silent partial writes into caller-provided buffers. This vulnerability is fixed in 14.0.0.
  • CVE-2026-41988: uuid before 14.0.0 can make unexpected writes when external output buffers are used, and the UUID version is 3, 5, or 6. In particular, UUID version 4, which is very commonly used, is unaffected by this issue.
Created: 2026-04-23 Last update: 2026-04-25 15:16
2 security issues in bullseye high

There are 2 open security issues in bullseye.

2 important issues:
  • CVE-2026-41907: uuid is for the creation of RFC9562 (formerly RFC4122) UUIDs. Prior to 14.0.0, v3, v5, and v6 accept external output buffers but do not reject out-of-range writes (small buf or large offset). This allows silent partial writes into caller-provided buffers. This vulnerability is fixed in 14.0.0.
  • CVE-2026-41988: uuid before 14.0.0 can make unexpected writes when external output buffers are used, and the UUID version is 3, 5, or 6. In particular, UUID version 4, which is very commonly used, is unaffected by this issue.
Created: 2026-04-23 Last update: 2026-04-25 15:16
2 security issues in bookworm high

There are 2 open security issues in bookworm.

2 important issues:
  • CVE-2026-41907: uuid is for the creation of RFC9562 (formerly RFC4122) UUIDs. Prior to 14.0.0, v3, v5, and v6 accept external output buffers but do not reject out-of-range writes (small buf or large offset). This allows silent partial writes into caller-provided buffers. This vulnerability is fixed in 14.0.0.
  • CVE-2026-41988: uuid before 14.0.0 can make unexpected writes when external output buffers are used, and the UUID version is 3, 5, or 6. In particular, UUID version 4, which is very commonly used, is unaffected by this issue.
Created: 2026-04-23 Last update: 2026-04-25 15:16
lintian reports 1 error and 3 warnings high
Lintian reports 1 error and 3 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-04-25 Last update: 2026-04-25 08:31
debian/patches: 1 patch to forward upstream low

Among the 3 debian patches available in version 14.0.0+~11.0.0-1 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-04-25 10:00
testing migrations
  • excuses:
    • Migrates after: node-istanbul, node-jest-junit, node-sockjs
    • Migration status for node-uuid (8.3.2+~8.3.4-3 to 14.0.0+~11.0.0-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for node-ajv-keywords/5.1.0-4: amd64: Regression ♻ (reference ♻), arm64: Regression ♻ (reference ♻), i386: Regression ♻ (reference ♻), ppc64el: Regression ♻ (reference ♻), riscv64: Regression ♻ (reference ♻), s390x: Reference test triggered, but real test failed already ♻
    • ∙ ∙ Autopkgtest for node-uuid/14.0.0+~11.0.0-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Too young, only 1 of 5 days old
    • ∙ ∙ Implicit dependency: node-uuid node-istanbul
    • ∙ ∙ Implicit dependency: node-uuid node-jest-junit
    • ∙ ∙ Implicit dependency: node-uuid node-sockjs
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/n/node-uuid.html
    • ∙ ∙ Reproduced on amd64
    • ∙ ∙ Reproduced on arm64
    • ∙ ∙ Reproduced on armhf
    • ∙ ∙ Reproduced on i386
    • ∙ ∙ Reproduced on ppc64el
    • Not considered
news
[rss feed]
  • [2026-04-24] Accepted node-uuid 14.0.0+~11.0.0-1 (source) into unstable (Xavier Guimard)
  • [2026-02-22] node-uuid 8.3.2+~8.3.4-3 MIGRATED to testing (Debian testing watch)
  • [2026-02-19] Accepted node-uuid 8.3.2+~8.3.4-3 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2026-02-19] Accepted node-uuid 8.3.2+~8.3.4-2 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2024-06-17] node-uuid 8.3.2+~8.3.4-1 MIGRATED to testing (Debian testing watch)
  • [2024-06-12] Accepted node-uuid 8.3.2+~8.3.4-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2023-08-16] node-uuid 8.3.2+~8.3.3-4 MIGRATED to testing (Debian testing watch)
  • [2023-08-14] Accepted node-uuid 8.3.2+~8.3.3-4 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-10-29] node-uuid 8.3.2+~8.3.3-3 MIGRATED to testing (Debian testing watch)
  • [2022-10-27] Accepted node-uuid 8.3.2+~8.3.3-3 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-03-19] node-uuid 8.3.2+~8.3.3-2 MIGRATED to testing (Debian testing watch)
  • [2022-03-19] node-uuid 8.3.2+~8.3.3-2 MIGRATED to testing (Debian testing watch)
  • [2022-03-16] Accepted node-uuid 8.3.2+~8.3.3-2 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2021-11-24] node-uuid 8.3.2+~8.3.3-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-21] Accepted node-uuid 8.3.2+~8.3.3-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2021-01-24] node-uuid 8.3.2+~8.3.0-4 MIGRATED to testing (Debian testing watch)
  • [2021-01-21] Accepted node-uuid 8.3.2+~8.3.0-4 (source) into unstable (Xavier Guimard)
  • [2021-01-01] node-uuid 8.3.2+~8.3.0-3 MIGRATED to testing (Debian testing watch)
  • [2020-12-30] Accepted node-uuid 8.3.2+~8.3.0-3 (source) into unstable (Pirate Praveen) (signed by: Praveen Arimbrathodiyil)
  • [2020-12-22] node-uuid 8.3.2+~8.3.0-2 MIGRATED to testing (Debian testing watch)
  • [2020-12-16] Accepted node-uuid 8.3.2+~8.3.0-2 (source) into unstable (Jonas Smedegaard)
  • [2020-12-14] Accepted node-uuid 8.3.2+~8.3.0-1~bpo10+1 (source all) into buster-backports, buster-backports (Debian FTP Masters) (signed by: Praveen Arimbrathodiyil)
  • [2020-12-11] node-uuid 8.3.2+~8.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-12-09] Accepted node-uuid 8.3.2+~8.3.0-1 (source) into unstable (Pirate Praveen) (signed by: Praveen Arimbrathodiyil)
  • [2020-11-30] Accepted node-uuid 3.4.0+~3.4.9-1 (source) into unstable (Jonas Smedegaard)
  • [2020-07-03] Accepted node-uuid 8.2.0-1 (source) into experimental (Pirate Praveen) (signed by: Praveen Arimbrathodiyil)
  • [2018-11-09] node-uuid 3.3.2-2 MIGRATED to testing (Debian testing watch)
  • [2018-11-06] Accepted node-uuid 3.3.2-2 (source all) into unstable, unstable (W. Martin Borgert)
  • [2018-11-06] Accepted node-uuid 3.3.2-1 (source all) into unstable, unstable (W. Martin Borgert)
  • [2018-02-07] node-uuid 1.4.7-5 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (1, 3)
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 8.3.2+~8.3.4-3
  • 1 bug

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing