A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun. References: https://github.com/facebook/zstd/issues/3200
Created mingw-zstd tracking bugs for this issue: Affects: fedora-all [bug 2179865] Created zstd tracking bugs for this issue: Affects: epel-7 [bug 2179867] Affects: fedora-all [bug 2179866]
Created zstd tracking bugs for this issue: Affects: openstack-rdo [bug 2179872]