When deserializing arrays, strings or bytes (blob) types zserio first reads the size of the variable, and then allocates sufficient memory to load data. Since the size is always trusted this can be abused by creating a data file with a large size value, causing the zserio runtime to allocate large amounts of memory.
Please cherry-pick 57f5fb.
zserio-encoded messages from non-trusted sources.rust-zerio to avoid impacting other applications.{
"github_reviewed": true,
"github_reviewed_at": "2026-05-07T01:54:57Z",
"cwe_ids": [
"CWE-789"
],
"severity": "HIGH",
"nvd_published_at": null
}