USN-5720-1: Zstandard vulnerabilities
Publication date
9 November 2022
Overview
Zstandard could be made to expose sensitive information
Releases
Packages
- libzstd - fast lossless compression algorithm
Details
It was discovered that Zstandard was not properly managing file
permissions when generating output files. A local attacker could
possibly use this issue to cause a race condition and gain
unauthorized access to sensitive data.
It was discovered that Zstandard was not properly managing file
permissions when generating output files. A local attacker could
possibly use this issue to cause a race condition and gain
unauthorized access to sensitive data.
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
16.04 xenial | zstd – 1.3.1+dfsg-1~ubuntu0.16.04.1+esm3 | ||
libzstd1 – 1.3.1+dfsg-1~ubuntu0.16.04.1+esm3 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.