From e3164908428ed96a95de34d06e4b6d8ae32f6573 Mon Sep 17 00:00:00 2001 From: "pinkforest(she/her)" <36498018+pinkforest@users.noreply.github.com> Date: Thu, 2 Feb 2023 22:47:16 +1100 Subject: [PATCH] Add `bzip2` DoS (#1554) * Add bzip2 * Minor fix * Add category --- crates/bzip2/RUSTSEC-0000-0000.md | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 crates/bzip2/RUSTSEC-0000-0000.md diff --git a/crates/bzip2/RUSTSEC-0000-0000.md b/crates/bzip2/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..97bf4dd --- /dev/null +++ b/crates/bzip2/RUSTSEC-0000-0000.md @@ -0,0 +1,27 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "bzip2" +aliases = ["CVE-2023-22895", "GHSA-96jv-r488-c2rj"] +date = "2023-09-01" +url = "https://github.com/alexcrichton/bzip2-rs/pull/86" +categories = ["denial-of-service"] + +[versions] +patched = [">= 0.4.4"] + +``` + +# bzip2 Denial of Service (DoS) + +Working with specific payloads can cause a Denial of Service (DoS) vector. + +Both `Decompress` and `Compress` implementations can enter into infinite loops +given specific payloads entered that trigger it. + +The issue is described in great detail in the [bzip2 repository issue](https://github.com/alexcrichton/bzip2-rs/pull/86). + +Thanks to bjrjk for finding and providing the patch for the issue and the +maintainer responsibly responding to release a fix quickly. + +Users who use the crate with untrusted data should update the `bzip2` to 0.4.4.