Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6860
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10450
https://issues.rpath.com/browse/RPL-1338
https://exchange.xforce.ibmcloud.com/vulnerabilities/23855
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172669
http://www.securityfocus.com/bid/16057
http://www.redhat.com/support/errata/RHSA-2010-0145.html
http://www.redhat.com/support/errata/RHSA-2007-0245.html
http://secunia.com/advisories/25161
http://secunia.com/advisories/25098
http://secunia.com/advisories/20117
http://secunia.com/advisories/18395
http://secunia.com/advisories/18280
http://secunia.com/advisories/18278
http://secunia.com/advisories/18251
http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:237