diff --git a/crates/bzip2/RUSTSEC-0000-0000.md b/crates/bzip2/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..97bf4dd --- /dev/null +++ b/crates/bzip2/RUSTSEC-0000-0000.md @@ -0,0 +1,27 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "bzip2" +aliases = ["CVE-2023-22895", "GHSA-96jv-r488-c2rj"] +date = "2023-09-01" +url = "https://github.com/alexcrichton/bzip2-rs/pull/86" +categories = ["denial-of-service"] + +[versions] +patched = [">= 0.4.4"] + +``` + +# bzip2 Denial of Service (DoS) + +Working with specific payloads can cause a Denial of Service (DoS) vector. + +Both `Decompress` and `Compress` implementations can enter into infinite loops +given specific payloads entered that trigger it. + +The issue is described in great detail in the [bzip2 repository issue](https://github.com/alexcrichton/bzip2-rs/pull/86). + +Thanks to bjrjk for finding and providing the patch for the issue and the +maintainer responsibly responding to release a fix quickly. + +Users who use the crate with untrusted data should update the `bzip2` to 0.4.4.