Debian Package Tracker
Register | Log in
Subscribe

redir

Redirect TCP connections

Choose email to subscribe with

general
  • source: redir (main)
  • version: 3.3-1
  • maintainer: Lucas Kanashiro (DMD)
  • arch: any
  • std-ver: 4.5.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.3-1
  • oldstable: 3.3-1
  • stable: 3.3-1
  • testing: 3.3-1
  • unstable: 3.3-1
versioned links
  • 3.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • redir (3 bugs: 0, 0, 3, 0)
action needed
Problems while searching for a new upstream version high
uscan had problems while searching for a new upstream version:
In debian/watch no matching files for watch source
  https://github.com/troglobit/redir/releases
Created: 2025-11-26 Last update: 2026-02-28 13:18
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2020-37182: Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length checking to overwrite memory and cause a segmentation fault, resulting in program termination.
Created: 2026-02-13 Last update: 2026-02-13 09:30
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2020-37182: Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length checking to overwrite memory and cause a segmentation fault, resulting in program termination.
Created: 2026-02-13 Last update: 2026-02-13 09:30
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2020-37182: Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length checking to overwrite memory and cause a segmentation fault, resulting in program termination.
Created: 2026-02-13 Last update: 2026-02-13 09:30
1 security issue in bullseye high

There is 1 open security issue in bullseye.

1 important issue:
  • CVE-2020-37182: Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length checking to overwrite memory and cause a segmentation fault, resulting in program termination.
Created: 2026-02-13 Last update: 2026-02-13 09:30
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2020-37182: Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length checking to overwrite memory and cause a segmentation fault, resulting in program termination.
Created: 2026-02-13 Last update: 2026-02-13 09:30
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2025-01-06 Last update: 2026-02-28 14:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.5.0).
Created: 2020-11-17 Last update: 2025-12-23 20:00
news
[rss feed]
  • [2020-05-29] redir 3.3-1 MIGRATED to testing (Debian testing watch)
  • [2020-05-27] Accepted redir 3.3-1 (source) into unstable (Lucas Kanashiro)
  • [2018-03-18] redir 3.2-1 MIGRATED to testing (Debian testing watch)
  • [2018-03-12] Accepted redir 3.2-1 (source amd64) into unstable (Lucas Kanashiro)
  • [2017-06-20] redir 3.1-1 MIGRATED to testing (Debian testing watch)
  • [2017-03-07] Accepted redir 3.1-1 (source amd64) into unstable (Lucas Kanashiro)
  • [2017-02-02] redir 3.1-1~exp1 MIGRATED to testing (Debian testing watch)
  • [2017-01-22] Accepted redir 3.1-1~exp1 (source amd64) into unstable (Lucas Kanashiro)
  • [2016-05-30] Accepted redir 3.0-1~exp1 (source) into experimental (Lucas Kanashiro) (signed by: Antonio Terceiro)
  • [2015-06-15] redir 2.2.1-13 MIGRATED to testing (Britney)
  • [2015-06-09] Accepted redir 2.2.1-13 (source amd64) into unstable (Lucas Kanashiro) (signed by: Antonio Terceiro)
  • [2015-05-31] Accepted redir 2.2.1-12 (source amd64) into unstable (Lucas Kanashiro) (signed by: Joao Eriberto Mota Filho)
  • [2013-09-20] redir 2.2.1-11 MIGRATED to testing (Debian testing watch)
  • [2013-09-09] Accepted redir 2.2.1-11 (source amd64) (Tobias Frost) (signed by: Patrick Matthäi)
  • [2012-03-15] redir 2.2.1-10 MIGRATED to testing (Debian testing watch)
  • [2012-03-04] Accepted redir 2.2.1-10 (source i386) (Daniel Kahn Gillmor)
  • [2009-03-15] redir 2.2.1-9 MIGRATED to testing (Debian testing watch)
  • [2009-03-04] Accepted redir 2.2.1-9 (source i386) (Daniel Kahn Gillmor)
  • [2008-02-27] redir 2.2.1-8 MIGRATED to testing (Debian testing watch)
  • [2008-01-15] Accepted redir 2.2.1-8 (source i386) (Daniel Kahn Gillmor)
  • [2005-10-24] Accepted redir 2.2.1-2 (source i386 sparc alpha) (Daniel Kahn Gillmor)
  • [2005-10-22] Accepted redir 2.2.1-1 (source i386 sparc alpha) (Daniel Kahn Gillmor)
  • [2005-09-16] Accepted redir 2.1-3 (source i386) (Bernd Eckenfels)
  • [2003-08-24] Accepted redir 2.1-2.1 (i386 source) (Daniel Schepler)
  • [2000-07-23] Installed redir 2.1-2 (source i386) (Bernd Eckenfels)
  • [1999-11-21] Installed redir 2.1-1 (source i386) (Bernd Eckenfels)
bugs [bug history graph]
  • all: 3
  • RC: 0
  • I&N: 0
  • M&W: 3
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.3-1build1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing