Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-cwq5-8pvq-j65j | Zserio Runtime: Integer Overflow in BitStreamReader and Unbounded Memory Allocation in Deserialization |
Tue, 28 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nds-association
Nds-association zserio |
|
| CPEs | cpe:2.3:a:nds-association:zserio:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nds-association
Nds-association zserio |
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ndsev
Ndsev zserio |
|
| Vendors & Products |
Ndsev
Ndsev zserio |
Mon, 27 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zserio is a framework for serializing structured data with a compact and efficient way with low overhead. Prior to 2.18.1, a crafted payload as small as 4-5 bytes can force memory allocations of up to 16 GB, crashing any process with an OOM error (Denial of Service). This vulnerability is fixed in 2.18.1. | |
| Title | Zserio: Integer Overflow in BitStreamReader and Unbounded Memory Allocation in Deserialization | |
| Weaknesses | CWE-789 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-27T13:35:28.660Z
Reserved: 2026-03-20T18:05:11.829Z
Link: CVE-2026-33524
Updated: 2026-04-27T13:20:22.417Z
Status : Analyzed
Published: 2026-04-24T19:17:09.850
Modified: 2026-04-28T18:33:01.667
Link: CVE-2026-33524
No data.
OpenCVE Enrichment
Updated: 2026-04-28T20:15:26Z
Github GHSA