Folks, Just in case you do use bzip2, there are bzip2 .src.rpm packages for RH73, RH9, FC1 and FC2 needing Publish (source-level) QA at: <https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158801#c8>. In case any of you now reading this are new to this list and to Fedora Legacy, the QA process for "Publish QA" is documented here: <http://www.fedoraproject.org/wiki/Legacy/QAPublish> If you find any of this confusing or don't understand something, please don't be shy: Ask. We don't bite. Usually. :-) Thank you. -David --- --- --- Here is a list of the vulnerabilties this bzip2 update is patching (from Red Hat Security Advisory RHSA-2005:474-01, at <http://tinyurl.com/blt2r>): "A bug was found in the way bzgrep processes file names. If a user can be tricked into running bzgrep on a file with a carefully crafted file name, arbitrary commands could be executed as the user running bzgrep. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0758 to this issue. "A bug was found in the way bzip2 modifies file permissions during decompression. If an attacker has write access to the directory into which bzip2 is decompressing files, it is possible for them to modify permissions on files owned by the user running bzip2 (CAN-2005-0953). "A bug was found in the way bzip2 decompresses files. It is possible for an attacker to create a specially crafted bzip2 file which will cause bzip2 to cause a denial of service (by filling disk space) if decompressed by a victim (CAN-2005-1260)." -- fedora-legacy-list@xxxxxxxxxx http://www.redhat.com/mailman/listinfo/fedora-legacy-list