GNU userv Service Program Environment Corruption Vulnerability

The userv maintainer suggests upgrading to userv 1.0.1. If the upgrade is not available, a patch can be applied.

(From the Bugtraq message):
Index: servexec.c
RCS file: /usr/src/CVS/userv/servexec.c,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -r1.13 -r1.14
--- servexec.c 2000/03/06 18:14:46 1.13
+++ servexec.c 2000/07/27 00:08:34 1.14
@@ -266,7 +266,8 @@
fdarray[fd].holdfd= -1;
for (fd=0; fd<fdarrayused; fd++) {
- if (fdarray[fd].realfd < fdarrayused) fdarray[fdarray[fd].realfd].holdfd= fd;
+ if (fdarray[fd].realfd < fdarrayused && fdarray[fd].realfd >= 0)
+ fdarray[fdarray[fd].realfd].holdfd= fd;
for (fd=0; fd<fdarrayused; fd++) {
realfd= fdarray[fd].realfd;

Additionally, updates are available for Debian Linux.
(From the Debian advisory):

Debian 2.1:
Source archives:
MD5 checksum: 473a8fe477d20614aad97f538896969a
MD5 checksum: 40b052547e2ea9fa69a12ee24dfe2af7

Alpha architecture:
MD5 checksum: 4934d1163e2e5fbb2d74d5a949089aa7

Intel ia32 architecture:
MD5 checksum: ebf8d6cd431e94b6e731636d1d61440e

Motorola 680x0 architecture:
MD5 checksum: b59d78066362bce1f91005891958c362

Sun Sparc architecture:
MD5 checksum: ab880dac8965d99ca64044c0ef438975

Debian 2.2pre Potato:

Source archives:
MD5 checksum: 1a92258cecdb878ddd2f58cd03bd59b1
MD5 checksum: ddf8df51026a1b880dc95f9ca04a6deb

Alpha architecture:
MD5 checksum: 81d800fb0b29ef48f8b8bbc20e2b2ec1

Intel ia32 architecture:
MD5 checksum: 82752bd8dcc7ec1e187b6d9cfe7403d0

Sun Sparc architecture:
MD5 checksum: 019430e9ffdff374a87e0003da16b97b

GNU userv 1.0 .0


Privacy Statement
Copyright 2010, SecurityFocus