Debian Package Tracker
Register | Log in
Subscribe

pacparser

Choose email to subscribe with

general
  • source: pacparser (main)
  • version: 1.3.6-1.4
  • maintainer: Manu Garg (DMD)
  • uploaders: Andrew Pollock [DMD]
  • arch: any
  • std-ver: 3.9.6
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.3.6-1.1
  • oldstable: 1.3.6-1.1
  • stable: 1.3.6-1.2
  • testing: 1.3.6-1.4
  • unstable: 1.3.6-1.4
versioned links
  • 1.3.6-1.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.3.6-1.2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.3.6-1.4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libpacparser-dev
  • libpacparser1
  • python3-pacparser
action needed
A new upstream version is available: 1.4.1 high
A new upstream version 1.4.1 is available, you should consider packaging it.
Created: 2020-06-29 Last update: 2023-04-01 06:37
Standards version of the package is outdated. high
The package is severely out of date with respect to the Debian Policy. The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 3.9.6).
Created: 2018-04-16 Last update: 2023-03-02 19:35
lintian reports 6 warnings normal
Lintian reports 6 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2020-07-29 Last update: 2023-02-04 14:04
1 low-priority security issue in bullseye low

There is 1 open security issue in bullseye.

1 issue left for the package maintainer to handle:
  • CVE-2019-25078: (needs triaging) A vulnerability classified as problematic was found in pacparser up to 1.3.x. Affected by this vulnerability is the function pacparser_find_proxy of the file src/pacparser.c. The manipulation of the argument url leads to buffer overflow. Attacking locally is a requirement. Upgrading to version 1.4.0 is able to address this issue. The name of the patch is 853e8f45607cb07b877ffd270c63dbcdd5201ad9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215443.

You can find information about how to handle this issue in the security team's documentation.

Created: 2022-12-16 Last update: 2023-03-27 11:06
debian/patches: 1 patch to forward upstream low

Among the 2 debian patches available in version 1.3.6-1.4 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-03-02 Last update: 2023-03-02 21:44
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2023-02-01 Last update: 2023-02-01 00:37
news
[rss feed]
  • [2023-03-12] pacparser 1.3.6-1.4 MIGRATED to testing (Debian testing watch)
  • [2023-03-02] Accepted pacparser 1.3.6-1.4 (source) into unstable (Adrian Bunk)
  • [2022-08-06] pacparser 1.3.6-1.3 MIGRATED to testing (Debian testing watch)
  • [2022-07-26] Accepted pacparser 1.3.6-1.3 (source) into unstable (Adrian Bunk)
  • [2020-03-08] pacparser 1.3.6-1.2 MIGRATED to testing (Debian testing watch)
  • [2020-03-03] Accepted pacparser 1.3.6-1.2 (source) into unstable (Scott Kitterman) (signed by: Donald Scott Kitterman)
  • [2016-01-17] pacparser 1.3.6-1.1 MIGRATED to testing (Debian testing watch)
  • [2016-01-11] Accepted pacparser 1.3.6-1.1 (source amd64) into unstable (Scott Kitterman) (signed by: Donald Scott Kitterman)
  • [2015-09-17] pacparser 1.3.6-1 MIGRATED to testing (Britney)
  • [2015-09-11] Accepted pacparser 1.3.6-1 (source amd64) into unstable, unstable (Manu Garg) (signed by: Andrew Pollock)
  • [2015-08-27] pacparser 1.3.0-2.1 MIGRATED to testing (Britney)
  • [2015-08-21] Accepted pacparser 1.3.0-2.1 (source amd64) into unstable (Andrey Rahmatullin)
  • [2012-02-24] pacparser 1.3.0-2 MIGRATED to testing (Debian testing watch)
  • [2012-02-13] Accepted pacparser 1.3.0-2 (source amd64) (Andrew Pollock)
  • [2011-10-06] pacparser 1.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2011-09-20] Accepted pacparser 1.3.0-1 (source i386) (Manu Garg) (signed by: Andrew Pollock)
  • [2011-03-31] pacparser 1.2.7-1 MIGRATED to testing (Debian testing watch)
  • [2011-03-20] Accepted pacparser 1.2.7-1 (source i386) (Manu Garg) (signed by: Andrew Pollock)
  • [2011-02-06] pacparser 1.2.6-3 MIGRATED to testing (Debian testing watch)
  • [2011-01-08] Accepted pacparser 1.2.6-3 (source i386) (Andrew Pollock)
  • [2010-12-20] pacparser 1.2.6-2 MIGRATED to testing (Debian testing watch)
  • [2010-11-29] Accepted pacparser 1.2.6-2 (source i386) (Andrew Pollock)
  • [2010-11-27] pacparser 1.2.6-1 MIGRATED to testing (Debian testing watch)
  • [2010-09-18] Accepted pacparser 1.2.6-1 (source i386) (Andrew Pollock)
  • [2010-09-13] Accepted pacparser 1.2.5-1 (source i386) (Andrew Pollock)
  • [2010-09-11] Accepted pacparser 1.2.2-1 (source i386) (Andrew Pollock)
  • [2010-03-16] pacparser 1.0.9-2 MIGRATED to testing (Debian testing watch)
  • [2010-03-05] Accepted pacparser 1.0.9-2 (source i386) (Andrew Pollock)
  • [2009-12-17] pacparser 1.0.9-1 MIGRATED to testing (Debian testing watch)
  • [2009-12-04] Accepted pacparser 1.0.9-1 (source i386) (Andrew Pollock)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • lintian (0, 6)
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.3.6-1.3build2
  • 1 bug

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing