The bzip2 crate before 0.4.4 for Rust allow attackers to cause a denial of service via a large file that triggers an integer overflow in mem.rs. NOTE: this is unrelated to the https://crates.io/crates/bzip2-rs product. https://crates.io/crates/bzip2/versions https://github.com/alexcrichton/bzip2-rs/pull/86
Created rust-bzip2 tracking bugs for this issue: Affects: fedora-all [bug 2159752]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.