Content-Type: |
text/plain; charset="utf-8" |
Date: |
Thu, 24 Feb 2022 20:16:08 -0000 |
Reply-To: |
|
Subject: |
|
MIME-Version: |
1.0 |
Message-ID: |
<20220224201608.515.87532@0acbe050e934> |
Content-Transfer-Encoding: |
7bit |
Sender: |
|
From: |
|
Parts/Attachments: |
|
|
Synopsis: Important: cyrus-sasl security update
Advisory ID: SLSA-2022:0666-1
Issue Date: 2022-02-24
CVE Numbers: CVE-2022-24407
--
Security Fix(es):
* cyrus-sasl: failure to properly escape SQL input allows an attacker to
execute arbitrary SQL commands (CVE-2022-24407)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
--
SL7
x86_64
cyrus-sasl-2.1.26-24.el7_9.x86_64.rpm
cyrus-sasl-debuginfo-2.1.26-24.el7_9.i686.rpm
cyrus-sasl-debuginfo-2.1.26-24.el7_9.x86_64.rpm
cyrus-sasl-gssapi-2.1.26-24.el7_9.i686.rpm
cyrus-sasl-gssapi-2.1.26-24.el7_9.x86_64.rpm
cyrus-sasl-lib-2.1.26-24.el7_9.i686.rpm
cyrus-sasl-lib-2.1.26-24.el7_9.x86_64.rpm
cyrus-sasl-md5-2.1.26-24.el7_9.i686.rpm
cyrus-sasl-md5-2.1.26-24.el7_9.x86_64.rpm
cyrus-sasl-plain-2.1.26-24.el7_9.i686.rpm
cyrus-sasl-plain-2.1.26-24.el7_9.x86_64.rpm
cyrus-sasl-scram-2.1.26-24.el7_9.i686.rpm
cyrus-sasl-scram-2.1.26-24.el7_9.x86_64.rpm
cyrus-sasl-2.1.26-24.el7_9.i686.rpm
cyrus-sasl-devel-2.1.26-24.el7_9.i686.rpm
cyrus-sasl-devel-2.1.26-24.el7_9.x86_64.rpm
cyrus-sasl-gs2-2.1.26-24.el7_9.i686.rpm
cyrus-sasl-gs2-2.1.26-24.el7_9.x86_64.rpm
cyrus-sasl-ldap-2.1.26-24.el7_9.i686.rpm
cyrus-sasl-ldap-2.1.26-24.el7_9.x86_64.rpm
cyrus-sasl-ntlm-2.1.26-24.el7_9.i686.rpm
cyrus-sasl-ntlm-2.1.26-24.el7_9.x86_64.rpm
cyrus-sasl-sql-2.1.26-24.el7_9.i686.rpm
cyrus-sasl-sql-2.1.26-24.el7_9.x86_64.rpm
- Scientific Linux Development Team
|
|
|