| Name | CVE-2026-44229 |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|
| request-tracker4 (PTS) | bullseye | 4.4.4+dfsg-2+deb11u3 | vulnerable |
| bullseye (security) | 4.4.4+dfsg-2+deb11u5 | vulnerable |
| bookworm, bookworm (security) | 4.4.6+dfsg-1.1+deb12u3 | vulnerable |
| sid | 4.4.7+dfsg-4 | vulnerable |
| request-tracker5 (PTS) | bookworm | 5.0.3+dfsg-3~deb12u5 | vulnerable |
| bookworm (security) | 5.0.3+dfsg-3~deb12u4 | vulnerable |
| trixie | 5.0.7+dfsg-4+deb13u2 | vulnerable |
| trixie (security) | 5.0.7+dfsg-4+deb13u1 | vulnerable |
| forky, sid | 5.0.9+dfsg-4 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
https://github.com/bestpractical/rt/releases/tag/rt-5.0.10