Debian Package Tracker
Register | Log in
Subscribe

scitokens-cpp

Binaries for scitokens-cpp

Choose email to subscribe with

general
  • source: scitokens-cpp (main)
  • version: 1.4.1-1
  • maintainer: Mattias Ellert (DMD)
  • arch: any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.5.1-2
  • oldstable: 0.7.3-1
  • stable: 1.1.3-1
  • testing: 1.4.1-1
  • unstable: 1.4.1-1
versioned links
  • 0.5.1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.7.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.1.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.4.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libscitokens-dev
  • libscitokens0t64
  • scitokens-cpp
action needed
2 security issues in trixie high

There are 2 open security issues in trixie.

2 important issues:
  • CVE-2026-32725: SciTokens C++ is a minimal library for creating and using SciTokens from C or C++. Prior to version 1.4.1, scitokens-cpp is vulnerable to an authorization bypass when processing path-based scopes in tokens. The library normalizes the scope path from the token before authorization and collapses ".." path components instead of rejecting them. As a result, an attacker can use parent-directory traversal in the scope claim to broaden the effective authorization beyond the intended directory. This issue has been patched in version 1.4.1.
  • CVE-2026-32726: SciTokens C++ is a minimal library for creating and using SciTokens from C or C++. Prior to version 1.4.1, scitokens-cpp is vulnerable to an authorization bypass in path-based scope validation. The enforcer used a simple string-prefix comparison when checking whether a requested resource path was covered by a token's authorized scope path. Because the check did not require a path-segment boundary, a token scoped to one path could incorrectly authorize access to sibling paths that merely started with the same prefix. This issue has been patched in version 1.4.1.
Created: 2026-04-03 Last update: 2026-04-03 14:32
2 security issues in bullseye high

There are 2 open security issues in bullseye.

2 important issues:
  • CVE-2026-32725: SciTokens C++ is a minimal library for creating and using SciTokens from C or C++. Prior to version 1.4.1, scitokens-cpp is vulnerable to an authorization bypass when processing path-based scopes in tokens. The library normalizes the scope path from the token before authorization and collapses ".." path components instead of rejecting them. As a result, an attacker can use parent-directory traversal in the scope claim to broaden the effective authorization beyond the intended directory. This issue has been patched in version 1.4.1.
  • CVE-2026-32726: SciTokens C++ is a minimal library for creating and using SciTokens from C or C++. Prior to version 1.4.1, scitokens-cpp is vulnerable to an authorization bypass in path-based scope validation. The enforcer used a simple string-prefix comparison when checking whether a requested resource path was covered by a token's authorized scope path. Because the check did not require a path-segment boundary, a token scoped to one path could incorrectly authorize access to sibling paths that merely started with the same prefix. This issue has been patched in version 1.4.1.
Created: 2026-04-03 Last update: 2026-04-03 14:32
2 security issues in bookworm high

There are 2 open security issues in bookworm.

2 important issues:
  • CVE-2026-32725: SciTokens C++ is a minimal library for creating and using SciTokens from C or C++. Prior to version 1.4.1, scitokens-cpp is vulnerable to an authorization bypass when processing path-based scopes in tokens. The library normalizes the scope path from the token before authorization and collapses ".." path components instead of rejecting them. As a result, an attacker can use parent-directory traversal in the scope claim to broaden the effective authorization beyond the intended directory. This issue has been patched in version 1.4.1.
  • CVE-2026-32726: SciTokens C++ is a minimal library for creating and using SciTokens from C or C++. Prior to version 1.4.1, scitokens-cpp is vulnerable to an authorization bypass in path-based scope validation. The enforcer used a simple string-prefix comparison when checking whether a requested resource path was covered by a token's authorized scope path. Because the check did not require a path-segment boundary, a token scoped to one path could incorrectly authorize access to sibling paths that merely started with the same prefix. This issue has been patched in version 1.4.1.
Created: 2026-04-03 Last update: 2026-04-03 14:32
lintian reports 6 warnings normal
Lintian reports 6 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-03-17 Last update: 2026-03-17 16:00
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.3).
Created: 2026-03-31 Last update: 2026-03-31 15:01
testing migrations
  • This package will soon be part of the auto-openssl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2026-03-21] scitokens-cpp 1.4.1-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-16] Accepted scitokens-cpp 1.4.1-1 (source) into unstable (Mattias Ellert)
  • [2026-03-03] scitokens-cpp 1.4.0-1 MIGRATED to testing (Debian testing watch)
  • [2026-02-25] Accepted scitokens-cpp 1.4.0-1 (source) into unstable (Mattias Ellert)
  • [2026-02-07] scitokens-cpp 1.3.0-2 MIGRATED to testing (Debian testing watch)
  • [2026-02-02] Accepted scitokens-cpp 1.3.0-2 (source) into unstable (Mattias Ellert)
  • [2026-01-30] Accepted scitokens-cpp 1.3.0-1 (source) into unstable (Mattias Ellert)
  • [2025-12-16] scitokens-cpp 1.2.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-12-10] Accepted scitokens-cpp 1.2.0-1 (source) into unstable (Mattias Ellert)
  • [2025-03-03] scitokens-cpp 1.1.3-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-25] Accepted scitokens-cpp 1.1.3-1 (source) into unstable (Mattias Ellert)
  • [2025-02-22] Accepted scitokens-cpp 1.1.2-2 (source) into unstable (Mattias Ellert)
  • [2024-11-06] scitokens-cpp 1.1.2-1 MIGRATED to testing (Debian testing watch)
  • [2024-11-01] Accepted scitokens-cpp 1.1.2-1 (source) into unstable (Mattias Ellert)
  • [2024-05-03] scitokens-cpp 1.1.1-1 MIGRATED to testing (Debian testing watch)
  • [2024-03-15] Accepted scitokens-cpp 1.1.1-1 (source) into unstable (Mattias Ellert)
  • [2024-03-10] Accepted scitokens-cpp 1.1.0-2 (source) into unstable (Mattias Ellert)
  • [2024-02-29] Accepted scitokens-cpp 1.1.0-1.1 (source) into unstable (Benjamin Drung)
  • [2024-02-03] Accepted scitokens-cpp 1.1.0-1.1~exp1 (source) into experimental (Sergio Durigan Junior)
  • [2023-11-16] scitokens-cpp 1.1.0-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-10] Accepted scitokens-cpp 1.1.0-1 (source) into unstable (Mattias Ellert)
  • [2023-06-25] scitokens-cpp 1.0.2-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-20] Accepted scitokens-cpp 1.0.2-1 (source) into unstable (Mattias Ellert)
  • [2022-11-12] scitokens-cpp 0.7.3-1 MIGRATED to testing (Debian testing watch)
  • [2022-11-07] Accepted scitokens-cpp 0.7.3-1 (source) into unstable (Mattias Ellert)
  • [2022-11-07] scitokens-cpp 0.7.2-1 MIGRATED to testing (Debian testing watch)
  • [2022-11-01] Accepted scitokens-cpp 0.7.2-1 (source) into unstable (Mattias Ellert)
  • [2022-06-30] scitokens-cpp 0.7.1-1 MIGRATED to testing (Debian testing watch)
  • [2022-06-23] Accepted scitokens-cpp 0.7.1-1 (source) into unstable (Mattias Ellert)
  • [2022-02-28] scitokens-cpp 0.7.0-2 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (0, 6)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.3.0-2

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing