Bug 2431924 (CVE-2026-24006)

Summary: CVE-2026-24006 seroval: Seroval: Denial of Service due to excessive recursion during object serialization
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in seroval. An attacker could exploit this vulnerability by providing a specially crafted JavaScript (JS) object with extreme depth during the serialization process. This could lead to exceeding the maximum call stack limit, resulting in a Denial of Service (DoS) for the application using the seroval library.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2431955, 2431957, 2431958    
Bug Blocks:    

Description OSIDB Bzimport 2026-01-22 03:01:21 UTC
Seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0
and below, serialization of objects with extreme depth can exceed the maximum call stack limit. In version 1.4.1, Seroval introduces a `depthLimit` parameter in serialization/deserialization methods. An error will be thrown if the depth limit is reached.