A race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00008.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00062.html | vendor advisory |
https://usn.ubuntu.com/4108-1/ | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00078.html | vendor advisory |
https://www.oracle.com/security-alerts/cpuoct2020.html | |
https://www.facebook.com/security/advisories/cve-2019-11922 | vendor advisory |
https://github.com/facebook/zstd/pull/1404/commits/3e5cdf1b6a85843e991d7d10f6a2567c15580da0 | third party advisory patch |