Package: clamav Version: 0.84-2.sarge.2 Severity: serious Tags: security Hi,
the new version 0.87 of clamav fixes vulnerabilities in handling of UPX and FSG compressed executables. >From upstreams Changelog: * Changes backported from CVS: - libclamav/upx.c: fix possible buffer overflow (acab) - libclamav/fsg.c: fix possible infinite loop (acab) For sarge the following patches are the one to fix it: --- clamav-0.84/libclamav/fsg.c 2005-09-16 17:54:11.121701163 +0200 +++ clamav-0.87/libclamav/fsg.c 2005-09-16 00:49:04.000000000 +0200 @@ -235,7 +235,7 @@ for (i = 0; i < sectcount ; i++) { uint32_t trva,trsz,traw; - if ( sections[i].rva < sections[i+1].rva ) + if ( sections[i].rva <= sections[i+1].rva ) continue; trva = sections[i].rva; traw = sections[i].raw; and: --- clamav-0.84/libclamav/upx.c 2005-04-27 23:53:57.000000000 +0200 +++ clamav-0.87/libclamav/upx.c 2005-09-16 00:53:54.000000000 +0200 @@ -117,7 +117,7 @@ } sections = pehdr+0xf8; - if ( ! (sectcnt = pehdr[6]+256*pehdr[7])) { + if ( ! (sectcnt = (unsigned char)pehdr[6]+256*(unsigned char)pehdr[7])) { cli_dbgmsg("UPX: No sections? - giving up rebuild\n"); return 0; } Greetings Martin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]