A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun. References: https://github.com/facebook/zstd/issues/3200
Created mingw-zstd tracking bugs for this issue: Affects: fedora-all [bug 2179865] Created zstd tracking bugs for this issue: Affects: epel-7 [bug 2179867] Affects: fedora-all [bug 2179866]
Created zstd tracking bugs for this issue: Affects: openstack-rdo [bug 2179872]
It's fixed since 1.5.4 [1] but BaseOS provides zstd-1.5.1-2.el9 [1] https://github.com/facebook/zstd/pull/3220/commits/f9f27de91c89d826c6a39c3ef44fb1b02f9a43aa
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:0894 https://access.redhat.com/errata/RHSA-2024:0894
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:1141 https://access.redhat.com/errata/RHSA-2024:1141
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2024:2619 https://access.redhat.com/errata/RHSA-2024:2619
This issue has been addressed in the following products: Red Hat AMQ Streams 2.7.0 Via RHSA-2024:3527 https://access.redhat.com/errata/RHSA-2024:3527