Debian Package Tracker
Register | Log in
Subscribe

node-serialize-javascript

serialize JavaScript to a superset of JSON

Choose email to subscribe with

general
  • source: node-serialize-javascript (main)
  • version: 7.0.4+~5.0.4-1
  • maintainer: Debian Javascript Maintainers (archive) (DMD)
  • uploaders: Jonas Smedegaard [DMD]
  • arch: all
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 5.0.1-2
  • oldstable: 6.0.0-2+deb12u1
  • stable: 6.0.2-1
  • testing: 7.0.4+~5.0.4-1
  • unstable: 7.0.4+~5.0.4-1
versioned links
  • 5.0.1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.0.0-2+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.0.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 7.0.4+~5.0.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • node-serialize-javascript (1 bugs: 0, 1, 0, 0)
action needed
Problems while searching for a new upstream version high
uscan had problems while searching for a new upstream version:
Devscripts::Uscan::Templates::Github failed: Missing owner at /srv/udd.debian.org/udd/vendor/devscripts/lib/Devscripts/Uscan/Templates/Github.pm line 10.
Created: 2026-03-19 Last update: 2026-04-03 00:00
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2026-34043: Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely. This issue has been patched in version 7.0.5.
Created: 2026-03-31 Last update: 2026-03-31 22:30
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-34043: Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely. This issue has been patched in version 7.0.5.
Created: 2026-03-31 Last update: 2026-03-31 22:30
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-34043: Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely. This issue has been patched in version 7.0.5.
Created: 2026-03-31 Last update: 2026-03-31 22:30
1 security issue in bullseye high

There is 1 open security issue in bullseye.

1 important issue:
  • CVE-2026-34043: Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely. This issue has been patched in version 7.0.5.
Created: 2026-03-31 Last update: 2026-03-31 22:30
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2026-34043: Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely. This issue has been patched in version 7.0.5.
Created: 2026-03-31 Last update: 2026-03-31 22:30
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2025-04-10 Last update: 2025-04-10 00:31
debian/patches: 1 patch to forward upstream low

Among the 1 debian patch available in version 7.0.4+~5.0.4-1 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-03-19 20:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.3).
Created: 2026-03-31 Last update: 2026-03-31 15:01
news
[rss feed]
  • [2026-03-21] node-serialize-javascript 7.0.4+~5.0.4-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-19] Accepted node-serialize-javascript 7.0.4+~5.0.4-1 (source) into unstable (Xavier Guimard)
  • [2025-05-11] Accepted node-serialize-javascript 6.0.0-2+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Xavier Guimard)
  • [2025-04-10] node-serialize-javascript 6.0.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-04-06] Accepted node-serialize-javascript 6.0.2-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2023-06-13] node-serialize-javascript 6.0.1-1 MIGRATED to testing (Debian testing watch)
  • [2023-03-03] Accepted node-serialize-javascript 6.0.1-1 (source) into unstable (Jonas Smedegaard)
  • [2022-12-10] node-serialize-javascript 6.0.0-2 MIGRATED to testing (Debian testing watch)
  • [2022-12-07] Accepted node-serialize-javascript 6.0.0-2 (source) into unstable (Jelmer Vernooij) (signed by: Jelmer Vernooij)
  • [2021-11-22] node-serialize-javascript 6.0.0-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-20] Accepted node-serialize-javascript 6.0.0-1 (source) into unstable (Jonas Smedegaard)
  • [2021-01-13] Accepted node-serialize-javascript 5.0.1-2~bpo10+1 (source all) into buster-backports, buster-backports (Debian FTP Masters) (signed by: Praveen Arimbrathodiyil)
  • [2020-12-09] node-serialize-javascript 5.0.1-2 MIGRATED to testing (Debian testing watch)
  • [2020-12-06] Accepted node-serialize-javascript 5.0.1-2 (source) into unstable (Jonas Smedegaard)
  • [2020-12-06] Accepted node-serialize-javascript 5.0.1-1 (source all) into unstable, unstable (Debian FTP Masters) (signed by: Jonas Smedegaard)
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 7.0.4+~5.0.4-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing