Debian Package Tracker
Register | Log in
Subscribe

zookeeper

High-performance coordination service for distributed applications

Choose email to subscribe with

general
  • source: zookeeper (main)
  • version: 3.9.4-2
  • maintainer: Debian Java Maintainers (archive) (DMD)
  • uploaders: tony mancill [DMD] – James Page [DMD]
  • arch: all any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.4.13-6+deb11u1
  • o-o-sec: 3.4.13-6+deb11u1
  • oldstable: 3.8.0-11+deb12u2
  • old-sec: 3.8.0-11+deb12u1
  • stable: 3.9.3-1
  • stable-p-u: 3.9.3-1+deb13u1
  • testing: 3.9.4-1
  • unstable: 3.9.4-2
versioned links
  • 3.4.13-6+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.8.0-11+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.8.0-11+deb12u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.9.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.9.3-1+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.9.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.9.4-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libzookeeper-java (1 bugs: 0, 1, 0, 0)
  • libzookeeper-java-doc
  • libzookeeper-mt-dev
  • libzookeeper-mt2
  • libzookeeper-st-dev
  • libzookeeper-st2
  • python3-zookeeper
  • zookeeper (4 bugs: 0, 3, 1, 0)
  • zookeeper-bin
  • zookeeperd (2 bugs: 0, 1, 1, 0)
action needed
A new upstream version is available: 3.9.5 high
A new upstream version 3.9.5 is available, you should consider packaging it.
Created: 2026-03-06 Last update: 2026-03-12 01:00
3 security issues in trixie high

There are 3 open security issues in trixie.

2 important issues:
  • CVE-2026-24281: Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. It's important to note that attacker must present a certificate which is trusted by ZKTrustManager which makes the attack vector harder to exploit. Users are recommended to upgrade to version 3.8.6 or 3.9.5, which fixes this issue by introducing a new configuration option to disable reverse DNS lookup in client and quorum protocols.
  • CVE-2026-24308: Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5 and 3.9.4 on all platforms allows an attacker to expose sensitive information stored in client configuration in the client's logfile. Configuration values are exposed at INFO level logging rendering potential production systems affected by the issue. Users are recommended to upgrade to version 3.8.6 or 3.9.5 which fixes this issue.
1 issue left for the package maintainer to handle:
  • CVE-2025-58457: (needs triaging) Improper permission check in ZooKeeper AdminServer lets authorized clients to run snapshot and restore command with insufficient permissions. This issue affects Apache ZooKeeper: from 3.9.0 before 3.9.4. Users are recommended to upgrade to version 3.9.4, which fixes the issue. The issue can be mitigated by disabling both commands (via admin.snapshot.enabled and admin.restore.enabled), disabling the whole AdminServer interface (via admin.enableServer), or ensuring that the root ACL does not provide open permissions. (Note that ZooKeeper ACLs are not recursive, so this does not impact operations on child nodes besides notifications from recursive watches.)

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-09-24 Last update: 2026-03-10 09:32
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2026-24281: Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. It's important to note that attacker must present a certificate which is trusted by ZKTrustManager which makes the attack vector harder to exploit. Users are recommended to upgrade to version 3.8.6 or 3.9.5, which fixes this issue by introducing a new configuration option to disable reverse DNS lookup in client and quorum protocols.
  • CVE-2026-24308: Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5 and 3.9.4 on all platforms allows an attacker to expose sensitive information stored in client configuration in the client's logfile. Configuration values are exposed at INFO level logging rendering potential production systems affected by the issue. Users are recommended to upgrade to version 3.8.6 or 3.9.5 which fixes this issue.
Created: 2026-03-10 Last update: 2026-03-10 09:32
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2026-24281: Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. It's important to note that attacker must present a certificate which is trusted by ZKTrustManager which makes the attack vector harder to exploit. Users are recommended to upgrade to version 3.8.6 or 3.9.5, which fixes this issue by introducing a new configuration option to disable reverse DNS lookup in client and quorum protocols.
  • CVE-2026-24308: Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5 and 3.9.4 on all platforms allows an attacker to expose sensitive information stored in client configuration in the client's logfile. Configuration values are exposed at INFO level logging rendering potential production systems affected by the issue. Users are recommended to upgrade to version 3.8.6 or 3.9.5 which fixes this issue.
Created: 2026-03-10 Last update: 2026-03-10 09:32
3 security issues in bullseye high

There are 3 open security issues in bullseye.

2 important issues:
  • CVE-2026-24281: Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. It's important to note that attacker must present a certificate which is trusted by ZKTrustManager which makes the attack vector harder to exploit. Users are recommended to upgrade to version 3.8.6 or 3.9.5, which fixes this issue by introducing a new configuration option to disable reverse DNS lookup in client and quorum protocols.
  • CVE-2026-24308: Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5 and 3.9.4 on all platforms allows an attacker to expose sensitive information stored in client configuration in the client's logfile. Configuration values are exposed at INFO level logging rendering potential production systems affected by the issue. Users are recommended to upgrade to version 3.8.6 or 3.9.5 which fixes this issue.
1 ignored issue:
  • CVE-2024-23944: Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn't do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.
Created: 2026-03-10 Last update: 2026-03-10 09:32
2 security issues in bookworm high

There are 2 open security issues in bookworm.

2 important issues:
  • CVE-2026-24281: Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. It's important to note that attacker must present a certificate which is trusted by ZKTrustManager which makes the attack vector harder to exploit. Users are recommended to upgrade to version 3.8.6 or 3.9.5, which fixes this issue by introducing a new configuration option to disable reverse DNS lookup in client and quorum protocols.
  • CVE-2026-24308: Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5 and 3.9.4 on all platforms allows an attacker to expose sensitive information stored in client configuration in the client's logfile. Configuration values are exposed at INFO level logging rendering potential production systems affected by the issue. Users are recommended to upgrade to version 3.8.6 or 3.9.5 which fixes this issue.
Created: 2026-03-10 Last update: 2026-03-10 09:32
1 security issue in buster high

There is 1 open security issue in buster.

1 important issue:
  • CVE-2024-23944: Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn't do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.
Created: 2024-03-14 Last update: 2024-05-14 02:03
Depends on packages which need a new maintainer normal
The packages that zookeeper depends on which need a new maintainer are:
  • javacc-maven-plugin (#922602)
    • Build-Depends: libjavacc-maven-plugin-java
Created: 2022-06-29 Last update: 2026-03-12 05:03
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2022-07-08 Last update: 2026-03-11 23:30
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2026-03-09 Last update: 2026-03-09 10:00
11 new commits since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit 0dfe05523c6d4a8166259b746699338f887f733d
Author: tony mancill <tmancill@debian.org>
Date:   Sun Mar 8 20:56:06 2026 -0700

    Revert "Update upstream source from tag 'upstream/3.9.5'"
    
    This reverts commit 0d194f94bc7b54f3d873ddc43f3cab4919f4bd16, reversing
    changes made to 5c4df50d2fd9f1c4edaa55d1ffd633330df923dd.

commit fe62bd0105f6c07436b4b1ee3201a606052c4f30
Author: tony mancill <tmancill@debian.org>
Date:   Sun Mar 8 20:54:32 2026 -0700

    Revert "interim changelog entry"
    
    This reverts commit 8b93b9e8fcf11b2d7e07adc6441f1b1ed684d583.

commit 949e14ab7a45005654b4e3bbd9ea829e43d73a1e
Author: tony mancill <tmancill@debian.org>
Date:   Sun Mar 8 20:54:30 2026 -0700

    Revert "Refresh patches for upstream release 3.9.5"
    
    This reverts commit 0fd418bae4b19952154abb251c0af4c924a9e72d.

commit dc87f32e0dac707bf1d1097e7a20665e1d61c0e4
Author: tony mancill <tmancill@debian.org>
Date:   Sun Mar 8 20:54:28 2026 -0700

    Revert "Disable patches related to older version of junit"
    
    This reverts commit 2a2c01d174ac616f3da2e3bd1a58350865abfaa2.

commit 8d8c0feaf891526661e5833c96174b268003d4b8
Author: tony mancill <tmancill@debian.org>
Date:   Sun Mar 8 20:54:24 2026 -0700

    Revert "Update build-dep on JLine to libjline3-java"
    
    This reverts commit 2d2455b24c5b86819d3d99cc84072b24da89b8a7.

commit 2d2455b24c5b86819d3d99cc84072b24da89b8a7
Author: tony mancill <tmancill@debian.org>
Date:   Sun Mar 8 20:42:43 2026 -0700

    Update build-dep on JLine to libjline3-java

commit 2a2c01d174ac616f3da2e3bd1a58350865abfaa2
Author: tony mancill <tmancill@debian.org>
Date:   Sun Mar 8 20:16:28 2026 -0700

    Disable patches related to older version of junit
    
    20-no-Timeout-in-tests.patch
    21-use-ValueSource-with-ints.patch
    22-test-without_TempDir.patch

commit 0fd418bae4b19952154abb251c0af4c924a9e72d
Author: tony mancill <tmancill@debian.org>
Date:   Sun Mar 8 20:16:10 2026 -0700

    Refresh patches for upstream release 3.9.5

commit 8b93b9e8fcf11b2d7e07adc6441f1b1ed684d583
Author: tony mancill <tmancill@debian.org>
Date:   Sun Mar 8 19:57:09 2026 -0700

    interim changelog entry

commit 0d194f94bc7b54f3d873ddc43f3cab4919f4bd16
Merge: 5c4df50 97ae765
Author: tony mancill <tmancill@debian.org>
Date:   Sun Mar 8 19:56:47 2026 -0700

    Update upstream source from tag 'upstream/3.9.5'
    
    Update to upstream version '3.9.5'
    with Debian dir 1965d770b753d533943e12a3b133e3ca7a95d480

commit 97ae765a2285218bafe62dbaed6e50889c02318e
Author: tony mancill <tmancill@debian.org>
Date:   Sun Mar 8 19:56:35 2026 -0700

    New upstream version 3.9.5
Created: 2026-03-09 Last update: 2026-03-09 05:02
1 open merge request in Salsa normal
There is 1 open merge request for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-09-20 Last update: 2025-09-20 23:33
debian/patches: 10 patches to forward upstream low

Among the 27 debian patches available in version 3.9.4-2 of the package, we noticed the following issues:

  • 10 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-03-09 07:00
testing migrations
  • excuses:
    • Migration status for zookeeper (3.9.4-1 to 3.9.4-2): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for patroni/4.1.0-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Test triggered (failure will be ignored), s390x: Test triggered
    • ∙ ∙ Too young, only 3 of 5 days old
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/z/zookeeper.html
    • ∙ ∙ Not reproduced on amd64 (not a regression): libzookeeper-java, libzookeeper-java-doc
    • ∙ ∙ Not reproduced on arm64 (not a regression): libzookeeper-java, libzookeeper-java-doc
    • ∙ ∙ Not reproduced on armhf (not a regression): libzookeeper-java, libzookeeper-java-doc
    • ∙ ∙ Not reproduced on i386 (not a regression): libzookeeper-java, libzookeeper-java-doc
    • ∙ ∙ Not reproduced on ppc64el (not a regression): libzookeeper-java, libzookeeper-java-doc
    • Not considered
news
[rss feed]
  • [2026-03-08] Accepted zookeeper 3.9.4-2 (source) into unstable (tony mancill)
  • [2026-03-08] Accepted zookeeper 3.9.3-1+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Pierre Gruet)
  • [2025-10-05] zookeeper 3.9.4-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-29] Accepted zookeeper 3.9.4-1 (source) into unstable (tony mancill)
  • [2025-08-18] zookeeper 3.9.3-2 MIGRATED to testing (Debian testing watch)
  • [2025-08-12] Accepted zookeeper 3.9.3-2 (source) into unstable (tony mancill)
  • [2024-12-29] Accepted zookeeper 3.8.0-11+deb12u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2024-11-19] zookeeper 3.9.3-1 MIGRATED to testing (Debian testing watch)
  • [2024-11-13] Accepted zookeeper 3.9.3-1 (source) into unstable (Pierre Gruet)
  • [2024-05-14] zookeeper 3.9.2-2 MIGRATED to testing (Debian testing watch)
  • [2024-05-06] Accepted zookeeper 3.9.2-2 (source) into unstable (Pierre Gruet)
  • [2024-03-30] zookeeper 3.9.2-1 MIGRATED to testing (Debian testing watch)
  • [2024-03-25] Accepted zookeeper 3.9.2-1 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2023-11-04] Accepted zookeeper 3.4.13-6+deb11u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Pierre Gruet)
  • [2023-11-04] Accepted zookeeper 3.8.0-11+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Pierre Gruet)
  • [2023-11-03] zookeeper 3.9.1-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-31] Accepted zookeeper 3.8.0-11+deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Pierre Gruet)
  • [2023-10-31] Accepted zookeeper 3.4.13-6+deb11u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Pierre Gruet)
  • [2023-10-28] Accepted zookeeper 3.9.1-1 (source) into unstable (Pierre Gruet)
  • [2023-10-20] Accepted zookeeper 3.4.13-2+deb10u1 (source all amd64) into oldoldstable (Chris Lamb)
  • [2023-04-26] zookeeper 3.8.0-11 MIGRATED to testing (Debian testing watch)
  • [2023-04-06] Accepted zookeeper 3.8.0-11 (source) into unstable (Pierre Gruet)
  • [2022-11-26] zookeeper 3.8.0-10 MIGRATED to testing (Debian testing watch)
  • [2022-11-21] Accepted zookeeper 3.8.0-10 (source) into unstable (Thomas Goirand)
  • [2022-11-06] zookeeper 3.8.0-9 MIGRATED to testing (Debian testing watch)
  • [2022-10-31] Accepted zookeeper 3.8.0-9 (source) into unstable (Pierre Gruet)
  • [2022-09-08] zookeeper 3.8.0-8 MIGRATED to testing (Debian testing watch)
  • [2022-09-04] Accepted zookeeper 3.8.0-8 (source) into unstable (Pierre Gruet)
  • [2022-08-21] zookeeper 3.8.0-7 MIGRATED to testing (Debian testing watch)
  • [2022-08-15] Accepted zookeeper 3.8.0-7 (source) into unstable (Pierre Gruet)
  • 1
  • 2
bugs [bug history graph]
  • all: 16
  • RC: 0
  • I&N: 10
  • M&W: 6
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.9.4-1
  • 5 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing