The bzip2 crate before 0.4.4 for Rust allow attackers to cause a denial of service via a large file that triggers an integer overflow in mem.rs. NOTE: this is unrelated to the https://crates.io/crates/bzip2-rs product.
{
"binaries": [
{
"binary_version": "0.3.3-1",
"binary_name": "librust-bzip2+futures-dev"
},
{
"binary_version": "0.3.3-1",
"binary_name": "librust-bzip2+tokio-dev"
},
{
"binary_version": "0.3.3-1",
"binary_name": "librust-bzip2+tokio-io-dev"
},
{
"binary_version": "0.3.3-1",
"binary_name": "librust-bzip2-dev"
}
]
}