It was discovered that Zstandard incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_name": "libzstd1", "binary_version": "1.3.1+dfsg-1~ubuntu0.16.04.1+esm2" }, { "binary_name": "libzstd1-dbgsym", "binary_version": "1.3.1+dfsg-1~ubuntu0.16.04.1+esm2" }, { "binary_name": "libzstd1-dev", "binary_version": "1.3.1+dfsg-1~ubuntu0.16.04.1+esm2" }, { "binary_name": "zstd", "binary_version": "1.3.1+dfsg-1~ubuntu0.16.04.1+esm2" }, { "binary_name": "zstd-dbgsym", "binary_version": "1.3.1+dfsg-1~ubuntu0.16.04.1+esm2" } ] }