Debian Package Tracker
Register | Log in
Subscribe

sleuthkit

tools for forensics analysis on volume and filesystem data

Choose email to subscribe with

general
  • source: sleuthkit (main)
  • version: 4.14.0+dfsg-1
  • maintainer: Debian Security Tools (DMD)
  • uploaders: Hilko Bengen [DMD]
  • arch: any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 4.10.1+dfsg-1
  • oldstable: 4.11.1+dfsg-1
  • stable: 4.12.1+dfsg-3
  • testing: 4.14.0+dfsg-1
  • unstable: 4.14.0+dfsg-1
versioned links
  • 4.10.1+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.11.1+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.12.1+dfsg-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.14.0+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libtsk-dev
  • libtsk23
  • sleuthkit (1 bugs: 0, 1, 0, 0)
action needed
A new upstream version is available: 4.15.0 high
A new upstream version 4.15.0 is available, you should consider packaging it.
Created: 2026-04-18 Last update: 2026-04-19 05:30
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-40024: The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.
Created: 2026-04-09 Last update: 2026-04-11 02:00
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-40024: The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.
Created: 2026-04-09 Last update: 2026-04-11 02:00
Depends on packages which need a new maintainer normal
The packages that sleuthkit depends on which need a new maintainer are:
  • autopsy (#832370)
    • Suggests: autopsy
Created: 2019-11-22 Last update: 2026-04-19 08:30
lintian reports 2 warnings normal
Lintian reports 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-03-01 Last update: 2026-03-01 00:00
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2026-40024: (needs triaging) The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-04-09 Last update: 2026-04-11 02:00
1 low-priority security issue in bookworm low

There is 1 open security issue in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2026-40024: (needs triaging) The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-04-09 Last update: 2026-04-11 02:00
debian/patches: 5 patches to forward upstream low

Among the 7 debian patches available in version 4.14.0+dfsg-1 of the package, we noticed the following issues:

  • 5 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-02-26 11:00
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.3).
Created: 2026-03-31 Last update: 2026-03-31 15:01
testing migrations
  • This package will soon be part of the auto-libewf transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2026-03-03] sleuthkit 4.14.0+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2026-02-25] Accepted sleuthkit 4.14.0+dfsg-1 (source amd64) into unstable (Debian FTP Masters) (signed by: Hilko Bengen)
  • [2025-02-24] sleuthkit 4.12.1+dfsg-3 MIGRATED to testing (Debian testing watch)
  • [2025-02-19] Accepted sleuthkit 4.12.1+dfsg-3 (source) into unstable (Hilko Bengen)
  • [2024-05-03] sleuthkit 4.12.1+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2024-04-08] Accepted sleuthkit 4.12.1+dfsg-2 (source) into unstable (Francisco Vilmar Cardoso Ruviaro)
  • [2024-02-29] Accepted sleuthkit 4.12.1+dfsg-1.1 (source) into unstable (Benjamin Drung)
  • [2024-02-03] Accepted sleuthkit 4.12.1+dfsg-1.1~exp1 (source) into experimental (Sergio Durigan Junior)
  • [2023-12-28] sleuthkit 4.12.1+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2023-12-22] Accepted sleuthkit 4.12.1+dfsg-1 (source) into unstable (Francisco Vilmar Cardoso Ruviaro)
  • [2023-06-13] sleuthkit 4.12.0+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2023-03-14] Accepted sleuthkit 4.12.0+dfsg-1 (source) into unstable (Francisco Vilmar Cardoso Ruviaro)
  • [2022-06-20] Accepted sleuthkit 4.4.0-5+deb9u1 (source) into oldoldstable (Andreas Rönnquist)
  • [2021-11-22] sleuthkit 4.11.1+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-16] Accepted sleuthkit 4.11.1+dfsg-1 (source) into unstable (Francisco Vilmar Cardoso Ruviaro) (signed by: Samuel Henrique)
  • [2021-08-28] sleuthkit 4.11.0+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2021-08-22] Accepted sleuthkit 4.11.0+dfsg-1 (source) into unstable (Francisco Vilmar Cardoso Ruviaro) (signed by: Samuel Henrique)
  • [2020-12-26] sleuthkit 4.10.1+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2020-12-20] Accepted sleuthkit 4.10.1+dfsg-1 (source) into unstable (Francisco Vilmar Cardoso Ruviaro) (signed by: Raphaël Hertzog)
  • [2020-10-16] Accepted sleuthkit 4.6.5-1+deb10u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Samuel Henrique)
  • [2020-10-14] sleuthkit 4.10.0+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2020-10-08] Accepted sleuthkit 4.10.0+dfsg-1 (source) into unstable (Francisco Vilmar Cardoso Ruviaro) (signed by: Samuel Henrique)
  • [2020-09-03] sleuthkit 4.9.0+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2020-08-28] Accepted sleuthkit 4.9.0+dfsg-2 (source) into unstable (Francisco Vilmar Cardoso Ruviaro) (signed by: Samuel Henrique)
  • [2020-08-04] Accepted sleuthkit 4.9.0+dfsg-1 (source amd64) into experimental, experimental (Debian FTP Masters) (signed by: Samuel Henrique)
  • [2020-03-09] Accepted sleuthkit 4.1.3-4+deb8u2 (source amd64) into oldoldstable (Utkarsh Gupta)
  • [2019-09-21] sleuthkit 4.6.7-1 MIGRATED to testing (Debian testing watch)
  • [2019-09-16] Accepted sleuthkit 4.6.7-1 (source) into unstable (Hilko Bengen)
  • [2019-01-27] sleuthkit 4.6.5-1 MIGRATED to testing (Debian testing watch)
  • [2019-01-22] Accepted sleuthkit 4.6.5-1 (source) into unstable (Hilko Bengen)
  • 1
  • 2
bugs [bug history graph]
  • all: 5
  • RC: 0
  • I&N: 5
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 2)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 4.12.1+dfsg-3build1
  • 4 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing