The bzip2 crate before 0.4.4 for Rust allow attackers to cause a denial of service via a large file that triggers an integer overflow in mem.rs. NOTE: this is unrelated to the https://crates.io/crates/bzip2-rs product.
References
Configurations
History
21 Nov 2024, 07:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://crates.io/crates/bzip2/versions - Patch, Third Party Advisory | |
References | () https://github.com/alexcrichton/bzip2-rs/pull/86 - Exploit, Patch, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MI5SVRSGKBWB2JGDLDVIFY5ZQVDZP6I7/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQK57GGXJX3AH7KF6S7S3N7JC5QOYUQ7/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUK2JO25PPA6XBREKJRBLRCD22LKIOLO/ - | |
Summary |
|
11 Mar 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-10 01:15
Updated : 2024-11-21 07:45
NVD link : CVE-2023-22895
Mitre link : CVE-2023-22895
CVE.ORG link : CVE-2023-22895
JSON object : View
Products Affected
bzip2_project
- bzip2
CWE
CWE-190
Integer Overflow or Wraparound