Sereal::Decoder embeds a version of the Zstandard (zstd) library that is vulnerable to CVE-2019-11922. This is a race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Upgrade to Sereal::Decoder version 4.010 or later.
Workaround
No workaround given by the vendor.
Tue, 31 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 31 Mar 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sereal::Decoder versions from 4.000 through 4.009_002 for Perl is vulnerable to a buffer overwrite flaw in the Zstandard library. Sereal::Decoder embeds a version of the Zstandard (zstd) library that is vulnerable to CVE-2019-11922. This is a race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used. | |
| Title | Sereal::Decoder versions from 4.000 through 4.009_002 for Perl is vulnerable to a buffer overwrite flaw in the Zstandard library | |
| Weaknesses | CWE-1395 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-03-31T14:18:55.221Z
Reserved: 2026-03-28T19:49:07.023Z
Link: CVE-2024-14030
Updated: 2026-03-31T14:17:35.906Z
Status : Received
Published: 2026-03-31T12:16:26.153
Modified: 2026-03-31T15:16:08.290
Link: CVE-2024-14030
No data.
OpenCVE Enrichment
No data.