{"id":"CVE-2023-22895","details":"The bzip2 crate before 0.4.4 for Rust allow attackers to cause a denial of service via a large file that triggers an integer overflow in mem.rs. NOTE: this is unrelated to the https://crates.io/crates/bzip2-rs product.","aliases":["GHSA-96jv-r488-c2rj","RUSTSEC-2023-0004"],"modified":"2026-03-20T12:22:52.329993Z","published":"2023-01-10T01:15:10.677Z","related":["openSUSE-SU-2024:12610-1","openSUSE-SU-2024:12614-1","openSUSE-SU-2024:12616-1","openSUSE-SU-2025:15094-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MI5SVRSGKBWB2JGDLDVIFY5ZQVDZP6I7/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQK57GGXJX3AH7KF6S7S3N7JC5QOYUQ7/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUK2JO25PPA6XBREKJRBLRCD22LKIOLO/"},{"type":"FIX","url":"https://crates.io/crates/bzip2/versions"},{"type":"FIX","url":"https://github.com/alexcrichton/bzip2-rs/pull/86"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/trifectatechfoundation/bzip2-rs","events":[{"introduced":"0"},{"fixed":"3032f3790742bffda521e54d14429f459e078eba"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.4.4"}]}}],"versions":["0.3.1","0.3.2","0.3.3","0.4.1","0.4.2","bzip2-sys-0.1.10+1.0.8","bzip2-sys-0.1.5","bzip2-sys-0.1.6","bzip2-sys-0.1.7","bzip2-sys-0.1.8","bzip2-sys-0.1.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-22895.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}