The bzip2 crate before 0.4.4 for Rust allow attackers to cause a denial of service via a large file that triggers an integer overflow in mem.rs. NOTE: this is unrelated to the https://crates.io/crates/bzip2-rs product.
{ "binaries": [ { "binary_name": "librust-bzip2+futures-dev", "binary_version": "0.3.3-1" }, { "binary_name": "librust-bzip2+tokio-dev", "binary_version": "0.3.3-1" }, { "binary_name": "librust-bzip2+tokio-io-dev", "binary_version": "0.3.3-1" }, { "binary_name": "librust-bzip2-dev", "binary_version": "0.3.3-1" } ] }