Bug 784299 (CVE-2012-0806)

Summary: CVE-2012-0806 bip: Stack-based buffer overflow when processing connection events
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: bcl, mmahut, tross
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-08-21 23:54:20 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 784301, 784302    
Bug Blocks:    

Description Jan Lieskovsky 2012-01-24 14:11:39 UTC
A stack-based buffer overflow flaw was found in the way Bip, the IRC proxy, performed handling of IRC servers connection events (the number of file descriptors being used by that connection was not compared against predefined maximum number of file descriptors in 'fd_set'). When number of open file descriptors was greater or equal to FD_SETSIZE an attacker could use this flaw to cause bip daemon crash.

Upstream bug report:
[1] https://projects.duckcorp.org/issues/269

Upstream patch:
[2] https://projects.duckcorp.org/projects/bip/repository/revisions/222a33cb84a2e52ad55a88900b7895bf9dd0262c

CVE Request:
[3] http://www.openwall.com/lists/oss-security/2012/01/24/4

Comment 1 Jan Lieskovsky 2012-01-24 14:14:09 UTC
This issue affects the versions of the bip package, as shipped with Fedora EPEL 5 and Fedora EPEL 6. Please schedule an update.

--

This issue affects the versions of the bip package, as shipped with Fedora release of 15 and 16. Please schedule an update.

Comment 2 Jan Lieskovsky 2012-01-24 14:15:25 UTC
Created bip tracking bugs for this issue

Affects: fedora-all [bug 784301]
Affects: epel-all [bug 784302]

Comment 3 Vincent Danen 2012-01-24 23:04:59 UTC
This was assigned CVE-2012-0806: http://seclists.org/oss-sec/2012/q1/275

Comment 4 Fedora Update System 2012-02-04 05:23:39 UTC
bip-0.8.8-2.fc16 has been pushed to the Fedora 16 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 5 Fedora Update System 2012-02-04 05:27:53 UTC
bip-0.8.8-2.fc15 has been pushed to the Fedora 15 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 6 Fedora Update System 2012-02-09 18:43:51 UTC
bip-0.8.8-1.el6 has been pushed to the Fedora EPEL 6 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 7 Fedora Update System 2012-02-09 18:47:43 UTC
bip-0.8.8-1.el5 has been pushed to the Fedora EPEL 5 stable repository.  If problems still persist, please make note of it in this bug report.