Source: charybdis
Version: 4.1-1
Severity: grave
Tags: security

Upstream released Charybdis 4.0.1 and 4.1.1 fixing a security issue
which, apparently, is "with the PASS command and duplicate server
instances", at least according to the NEWS file:

https://github.com/charybdis-ircd/charybdis/blob/charybdis-4.1.1/NEWS.md

The hotfix seems to be:

https://github.com/charybdis-ircd/charybdis/commit/d4b2529a61fb48ebcd54bc0fcc6f400f97bfe251

And it seems like 3.x series (so stable and earlier) are not affected,
but I need to double-check that.

Upstream requested a CVE through the DWF but that process has
stalled. I recommended they go directly with MITRE or get an OVE, but
they instead generated the following UUID to track this issue:

a4c15999-a0b6-11e8-88af-00805fc181fe

Go figure...

-- System Information:
Debian Release: 9.5
  APT prefers stable
  APT policy: (500, 'stable'), (1, 'experimental'), (1, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-8-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_CA.UTF-8, LC_CTYPE=fr_CA.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_CA.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Reply via email to