* SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU
cpio has unspecified attack vectors and impact, resulting in a "crashing
stack."
* src/copyin.c: patch copyin.c to correct an allocation weakness in
safer_name_suffix() which could lead to a crash. Thanks to Stephan Hermann
* References:
CVE-2007-4476
LP: #161173
This bug was fixed in the package cpio - 2.6-17ubuntu0. 7.04.1
--------------- 7.04.1) feisty-security; urgency=low
cpio (2.6-17ubuntu0.
* SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU name_suffix( ) which could lead to a crash. Thanks to Stephan Hermann
cpio has unspecified attack vectors and impact, resulting in a "crashing
stack."
* src/copyin.c: patch copyin.c to correct an allocation weakness in
safer_
* References:
CVE-2007-4476
LP: #161173
-- Jamie Strandboge <email address hidden> Mon, 29 Sep 2008 16:58:13 -0500