USN-5301-2: Cyrus SASL vulnerability
22 February 2022
Cyrus SASL could run programs if it received specially crafted network traffic.
Releases
Packages
- cyrus-sasl2 - Cyrus Simple Authentication and Security Layer
Details
USN-5301-1 fixed a vulnerability in Cyrus. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
It was discovered that the Cyrus SASL SQL plugin incorrectly handled SQL
input. A remote attacker could use this issue to execute arbitrary SQL
commands.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
libsasl2-modules-sql
-
2.1.26.dfsg1-14ubuntu0.2+esm1
Available with Ubuntu Pro
Ubuntu 14.04
-
libsasl2-modules-sql
-
2.1.25.dfsg1-17ubuntu0.1~esm2
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-5301-1: cyrus-sasl2, libsasl2-modules, cyrus-sasl2-doc, libsasl2-modules-gssapi-mit, libsasl2-modules-otp, libsasl2-modules-gssapi-heimdal, libsasl2-2, sasl2-bin, libsasl2-dev, libsasl2-modules-ldap, libsasl2-modules-sql, libsasl2-modules-db