Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.
https://www.oracle.com/security-alerts/cpuoct2020.html
https://usn.ubuntu.com/4038-2/
https://usn.ubuntu.com/4038-1/
https://security.gentoo.org/glsa/201708-08
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
https://seclists.org/bugtraq/2019/Jul/22
https://seclists.org/bugtraq/2019/Aug/4
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
https://bugzilla.redhat.com/show_bug.cgi?id=1319648
http://www.securitytracker.com/id/1036132
http://www.securityfocus.com/bid/91297
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.openwall.com/lists/oss-security/2016/06/20/1
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html