---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Fedora update for cpio SECUNIA ADVISORY ID: SA27476 VERIFY ADVISORY: http://secunia.com/advisories/27476/ CRITICAL: Not critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Fedora Core 6 http://secunia.com/product/12487/ Fedora 7 http://secunia.com/product/15552/ DESCRIPTION: Fedora has issued an update for cpio. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error when processing specially crafted tar archives and can be exploited to cause a stack-based buffer overflow and crash the vulnerable application. SOLUTION: Apply updated packages. Fedora Core 6: 1971c968ff5f31b382ff20245644a190c801b7ee SRPMS/cpio-2.6-22.fc6.src.rpm 1971c968ff5f31b382ff20245644a190c801b7ee noarch/cpio-2.6-22.fc6.src.rpm 2fb6803b35ad1ff3aa06b915e92fd68e879b270a ppc/debug/cpio-debuginfo-2.6-22.fc6.ppc.rpm 52ba8e08409a8a9f070318dece3e24dc4fc4ec4d ppc/cpio-2.6-22.fc6.ppc.rpm 91ab0b03380985d92eb239141e9a671f438003b2 x86_64/cpio-2.6-22.fc6.x86_64.rpm b0c12ed13635d3b5351ee79df0bc902efff04cd7 x86_64/debug/cpio-debuginfo-2.6-22.fc6.x86_64.rpm 895d04b9436af530af61a8cc6f406973b161b6fc i386/debug/cpio-debuginfo-2.6-22.fc6.i386.rpm 8141c933272979cf16650f484c583958436a491b i386/cpio-2.6-22.fc6.i386.rpm Fedora 7: 911f30a11bdf2238f1a50b91f83d7d21d9455978 cpio-2.6-28.fc7.ppc64.rpm 2383a135ea76390668742d1bb2a9aa6c70ecb544 cpio-debuginfo-2.6-28.fc7.ppc64.rpm 381a54fed92cf24e362591c12d7162bc96d71817 cpio-2.6-28.fc7.i386.rpm 13c531c898880bc6e3819485551320f85fd8c766 cpio-debuginfo-2.6-28.fc7.i386.rpm c83be5c1d1f000d648cf869eba2c15c521461305 cpio-debuginfo-2.6-28.fc7.x86_64.rpm 893d61604221551311f239895200d7c41cd5e104 cpio-2.6-28.fc7.x86_64.rpm e6bb3ed461f30731455796b159fb7b694eff4c29 cpio-debuginfo-2.6-28.fc7.ppc.rpm 74d248d2291c172085b1917e88b685f6d7dcfe09 cpio-2.6-28.fc7.ppc.rpm 96e481bdd62838bfcb95376d1c0d1333a4b8cd96 cpio-2.6-28.fc7.src.rpm ORIGINAL ADVISORY: https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00078.html https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00053.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------