USN-5720-1: Zstandard vulnerabilities
9 November 2022
Zstandard could be made to expose sensitive information
Releases
Packages
- libzstd - fast lossless compression algorithm
Details
It was discovered that Zstandard was not properly managing file
permissions when generating output files. A local attacker could
possibly use this issue to cause a race condition and gain
unauthorized access to sensitive data.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
zstd
-
1.3.1+dfsg-1~ubuntu0.16.04.1+esm3
Available with Ubuntu Pro
-
libzstd1
-
1.3.1+dfsg-1~ubuntu0.16.04.1+esm3
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4760-1: libzstd1, libzstd1-dev, zstd, libzstd, libzstd1-udeb, libzstd-dev