| Name | CVE-2024-14031 |
| Description | Sereal::Encoder versions from 4.000 through 4.009_002 for Perl is vulnerable to a buffer overwrite flaw in the Zstandard library. Sereal::Encoder embeds a version of the Zstandard (zstd) library that is vulnerable to CVE-2019-11922. This is a race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|
| libsereal-encoder-perl (PTS) | bullseye | 4.018+ds-1 | fixed |
| bookworm | 5.003+ds-1 | fixed |
| forky, sid, trixie | 5.004+ds-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
- libsereal-encoder-perl <not-affected> (Vulnerable code never present in packaged versions)
Since 4.004+ds-1 the packaging excludes embedded zstd/ and before this version
does not embed a Zstandard (zstd) library
https://lists.security.metacpan.org/cve-announce/msg/38450207/