Description
Sereal::Decoder versions from 4.000 through 4.009_002 for Perl is vulnerable to a buffer overwrite flaw in the Zstandard library.

Sereal::Decoder embeds a version of the Zstandard (zstd) library that is vulnerable to CVE-2019-11922. This is a race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.
Published: 2026-03-31
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a buffer overwrite flaw in the Zstandard (zstd) library embedded within Sereal::Decoder. A race condition in the one‑pass compression functions of zstd prior to version 1.3.8 permits an attacker to write bytes beyond the allocated output buffer when a smaller-than‑recommended buffer is used. This overflow can corrupt memory and potentially allow arbitrary code execution or other severe compromise. The flaw maps to CWE‑1395.

Affected Systems

The affected component is Sereal::Decoder from the YVES vendor, in versions 4.000 through 4.009_002 for Perl. Users deploying these releases are susceptible to the buffer overflow unless they upgrade to the patched version 4.010 or later.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity, while the EPSS score of less than 1% suggests a low current exploitation probability. The vulnerability is not listed in CISA’s KEV catalog, which implies no proven large‑scale exploitation yet. The likely attack vector is the ability of an attacker to supply malicious serialized data that triggers the overflow, a scenario that requires remote or local access to the application using Sereal::Decoder. The combination of high impact and low exploitation likelihood points to a medium but non‑negligible risk that can be mitigated by timely patching.

Generated by OpenCVE AI on March 31, 2026 at 16:24 UTC.

Remediation

Vendor Solution

Upgrade to Sereal::Decoder version 4.010 or later.


OpenCVE Recommended Actions

  • Apply the vendor’s recommended upgrade to Sereal::Decoder version 4.010 or newer.
  • If an immediate upgrade is not possible, monitor the application for signs of memory corruption or unauthorized activity and restrict untrusted data sources until a patch can be applied.

Generated by OpenCVE AI on March 31, 2026 at 16:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Yves
Yves sereal::decoder
Vendors & Products Yves
Yves sereal::decoder

Tue, 31 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 11:45:00 +0000

Type Values Removed Values Added
Description Sereal::Decoder versions from 4.000 through 4.009_002 for Perl is vulnerable to a buffer overwrite flaw in the Zstandard library. Sereal::Decoder embeds a version of the Zstandard (zstd) library that is vulnerable to CVE-2019-11922. This is a race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.
Title Sereal::Decoder versions from 4.000 through 4.009_002 for Perl is vulnerable to a buffer overwrite flaw in the Zstandard library
Weaknesses CWE-1395
References

Subscriptions

Yves Sereal::decoder
cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-03-31T14:18:55.221Z

Reserved: 2026-03-28T19:49:07.023Z

Link: CVE-2024-14030

cve-icon Vulnrichment

Updated: 2026-03-31T14:17:35.906Z

cve-icon NVD

Status : Received

Published: 2026-03-31T12:16:26.153

Modified: 2026-03-31T15:16:08.290

Link: CVE-2024-14030

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:38:49Z

Weaknesses