Hi,
I am going to 0-day NMU this package. The attached patch 
fixes the problem.
It will be also archived on:
http://people.debian.org/~nion/nmu-diff/unrar-nonfree-3.7.3-1_3.7.3-1.1.patch

Kind regards
Nico

-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
diff -u unrar-nonfree-3.7.3/debian/changelog unrar-nonfree-3.7.3/debian/changelog
--- unrar-nonfree-3.7.3/debian/changelog
+++ unrar-nonfree-3.7.3/debian/changelog
@@ -1,3 +1,11 @@
+unrar-nonfree (1:3.7.3-1.1) unstable; urgency=high
+
+  * Non-maintainer upload by testing security team.
+  * Fixed integer signedness error in SET_VALUE function in
+    rarvm.cpp (CVE-2007-3726) (Closes: #437703).
+
+ -- Nico Golde <[EMAIL PROTECTED]>  Thu, 06 Sep 2007 13:30:31 +0200
+
 unrar-nonfree (1:3.7.3-1) unstable; urgency=high
 
   * New upstream release (Closes: #410580)
only in patch2:
unchanged:
--- unrar-nonfree-3.7.3.orig/rarvm.cpp
+++ unrar-nonfree-3.7.3/rarvm.cpp
@@ -843,7 +843,7 @@
         int DataSize=R[4];
         uint FileOffset=R[6];
 
-        if (DataSize>=VM_GLOBALMEMADDR)
+        if ((DataSize>=VM_GLOBALMEMADDR) || (DataSize<4))
           break;
 
         const int FileSize=0x1000000;
@@ -889,7 +889,7 @@
         int DataSize=R[4];
         uint FileOffset=R[6];
 
-        if (DataSize>=VM_GLOBALMEMADDR)
+        if ((DataSize>=VM_GLOBALMEMADDR) || (DataSize<21))
           break;
 
         uint CurPos=0;

Attachment: pgpnnoUd7VquD.pgp
Description: PGP signature

Reply via email to