cyrus-sasl is vulnerable to remote code execution. The vulnerability exists due to an unescaped password for a SQL INSERT or UPDATE statement.
www.openwall.com/lists/oss-security/2022/02/23/4
access.redhat.com/errata/RHSA-2022:0666
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=2055326
github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
lists.debian.org/debian-lts-announce/2022/03/msg00002.html
lists.fedoraproject.org/archives/list/[email protected]/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
lists.fedoraproject.org/archives/list/[email protected]/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
lists.fedoraproject.org/archives/list/[email protected]/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
security.netapp.com/advisory/ntap-20221007-0003/
www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
www.debian.org/security/2022/dsa-5087
www.oracle.com/security-alerts/cpujul2022.html