A stack-based buffer overflow flaw was found in the way Bip, the IRC proxy, performed handling of IRC servers connection events (the number of file descriptors being used by that connection was not compared against predefined maximum number of file descriptors in 'fd_set'). When number of open file descriptors was greater or equal to FD_SETSIZE an attacker could use this flaw to cause bip daemon crash. Upstream bug report: [1] https://projects.duckcorp.org/issues/269 Upstream patch: [2] https://projects.duckcorp.org/projects/bip/repository/revisions/222a33cb84a2e52ad55a88900b7895bf9dd0262c CVE Request: [3] http://www.openwall.com/lists/oss-security/2012/01/24/4
This issue affects the versions of the bip package, as shipped with Fedora EPEL 5 and Fedora EPEL 6. Please schedule an update. -- This issue affects the versions of the bip package, as shipped with Fedora release of 15 and 16. Please schedule an update.
Created bip tracking bugs for this issue Affects: fedora-all [bug 784301] Affects: epel-all [bug 784302]
This was assigned CVE-2012-0806: http://seclists.org/oss-sec/2012/q1/275
bip-0.8.8-2.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
bip-0.8.8-2.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.
bip-0.8.8-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
bip-0.8.8-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.