MGASA-2022-0111

Source
https://advisories.mageia.org/MGASA-2022-0111.html
Import Source
https://advisories.mageia.org/MGASA-2022-0111.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0111
Related
Published
2022-03-23T08:36:28Z
Modified
2022-03-23T07:50:03Z
Summary
Updated cyrus-sasl packages fix security vulnerability
Details

In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement. (CVE-2022-24407)

References
Credits

Affected packages

Mageia:8 / cyrus-sasl

Package

Name
cyrus-sasl
Purl
pkg:rpm/mageia/cyrus-sasl?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.27-3.1.mga8

Ecosystem specific

{
    "section": "core"
}