Debian Package Tracker
Register | Log in
Subscribe

php-zumba-json-serializer

Library to serialize PHP variables in JSON format

Choose email to subscribe with

general
  • source: php-zumba-json-serializer (main)
  • version: 3.2.4-1
  • maintainer: William Desportes (DMD) (DM)
  • arch: all
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 3.0.2-1
  • stable: 3.2.2-1
  • testing: 3.2.4-1
  • unstable: 3.2.4-1
versioned links
  • 3.0.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.2.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.2.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • php-zumba-json-serializer
action needed
1 new commit since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit 582938734e746d25246ae255e0937721dc3032b9
Author: William Desportes <williamdes@wdes.fr>
Date:   Tue Mar 3 00:04:40 2026 +0100

    Bump d/copyright dates
Created: 2026-03-02 Last update: 2026-03-10 20:02
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2026-27206: (needs triaging) Zumba Json Serializer is a library to serialize PHP variables in JSON format. In versions 3.2.2 and below, the library allows deserialization of PHP objects from JSON using a special @type field. The deserializer instantiates any class specified in the @type field without restriction. When processing untrusted JSON input, this behavior may allow an attacker to instantiate arbitrary classes available in the application. If a vulnerable application passes attacker-controlled JSON into JsonSerializer::unserialize() and contains classes with dangerous magic methods (such as __wakeup() or __destruct()), this may lead to PHP Object Injection and potentially Remote Code Execution (RCE), depending on available gadget chains in the application or its dependencies. This behavior is similar in risk profile to PHP's native unserialize() when used without the allowed_classes restriction. Applications are impacted only if untrusted or attacker-controlled JSON is passed into JsonSerializer::unserialize() and the application or its dependencies contain classes that can be leveraged as a gadget chain. This issue has been fixed in version 3.2.3. If an immediate upgrade isn't feasible, mitigate the vulnerability by never deserializing untrusted JSON with JsonSerializer::unserialize(), validating and sanitizing all JSON input before deserialization, and disabling @type-based object instantiation wherever possible.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-02-19 Last update: 2026-03-05 06:01
1 low-priority security issue in bookworm low

There is 1 open security issue in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2026-27206: (needs triaging) Zumba Json Serializer is a library to serialize PHP variables in JSON format. In versions 3.2.2 and below, the library allows deserialization of PHP objects from JSON using a special @type field. The deserializer instantiates any class specified in the @type field without restriction. When processing untrusted JSON input, this behavior may allow an attacker to instantiate arbitrary classes available in the application. If a vulnerable application passes attacker-controlled JSON into JsonSerializer::unserialize() and contains classes with dangerous magic methods (such as __wakeup() or __destruct()), this may lead to PHP Object Injection and potentially Remote Code Execution (RCE), depending on available gadget chains in the application or its dependencies. This behavior is similar in risk profile to PHP's native unserialize() when used without the allowed_classes restriction. Applications are impacted only if untrusted or attacker-controlled JSON is passed into JsonSerializer::unserialize() and the application or its dependencies contain classes that can be leveraged as a gadget chain. This issue has been fixed in version 3.2.3. If an immediate upgrade isn't feasible, mitigate the vulnerability by never deserializing untrusted JSON with JsonSerializer::unserialize(), validating and sanitizing all JSON input before deserialization, and disabling @type-based object instantiation wherever possible.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-02-19 Last update: 2026-03-05 06:01
news
[rss feed]
  • [2026-03-05] php-zumba-json-serializer 3.2.4-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-02] Accepted php-zumba-json-serializer 3.2.4-1 (source) into unstable (William Desportes)
  • [2024-12-13] php-zumba-json-serializer 3.2.2-1 MIGRATED to testing (Debian testing watch)
  • [2024-12-11] Accepted php-zumba-json-serializer 3.2.2-1 (source) into unstable (William Desportes)
  • [2023-10-21] php-zumba-json-serializer 3.2.1-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-18] Accepted php-zumba-json-serializer 3.2.1-1 (source) into unstable (William Desportes)
  • [2023-09-28] php-zumba-json-serializer 3.2.0-1 MIGRATED to testing (Debian testing watch)
  • [2023-09-28] php-zumba-json-serializer 3.2.0-1 MIGRATED to testing (Debian testing watch)
  • [2023-09-26] Accepted php-zumba-json-serializer 3.2.0-1 (source) into unstable (William Desportes)
  • [2023-09-26] php-zumba-json-serializer 3.0.2-2 MIGRATED to testing (Debian testing watch)
  • [2023-09-26] php-zumba-json-serializer 3.0.2-2 MIGRATED to testing (Debian testing watch)
  • [2023-09-23] Accepted php-zumba-json-serializer 3.0.2-2 (source) into unstable (William Desportes)
  • [2023-01-17] Accepted php-zumba-json-serializer 3.0.2-1~bpo11+1 (source all) into bullseye-backports (Debian FTP Masters) (signed by: James Valleroy)
  • [2022-12-23] php-zumba-json-serializer 3.0.2-1 MIGRATED to testing (Debian testing watch)
  • [2022-12-16] Accepted php-zumba-json-serializer 3.0.2-1 (source) into unstable (William Desportes)
  • [2022-12-07] php-zumba-json-serializer 3.0.1-2 MIGRATED to testing (Debian testing watch)
  • [2022-12-04] Accepted php-zumba-json-serializer 3.0.1-2 (source) into unstable (William Desportes) (signed by: James Valleroy)
  • [2022-12-03] Accepted php-zumba-json-serializer 3.0.1-1 (source all) into unstable (Debian FTP Masters) (signed by: Utkarsh Gupta)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.2.2-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing