cyrus-sasl-plain-32bit-2.1.27-150300.4.6.1 >  A b+p9|n@Y?xKWϻ5qsIQ]L*du_Hdr vuTG{Y0mM"r4rRG``t;X&Ì xF+2;.Ē+I}QqeY"gy:,li&wLD>d{_pP 9GeByy/ }aO'`>r|wAeis ;2)V"SAA: zLٌDS?8kf.+~!XE1an=<8-DZ~v|AI3DyrD2[꯹dǣ,1 9Sةt H DdL!$+c8jp> ?d  - Q2? Us      HXl (  (-84 9h :N >GHIXY\]^Fb`cdefluvwpxyCcyrus-sasl-plain-32bit2.1.27150300.4.6.1Plugin for the PLAIN SASL mechanismThis is the Cyrus SASL API implementation. It can be used on the client or server side to provide authentication. See RFC 2222 for more information.b#sheep54FpSUSE Linux Enterprise 15SUSE LLC BSD-4-Clausehttps://www.suse.com/Productivity/Networking/Otherhttp://asg.web.cmu.edu/sasl/linuxx86_64/sbin/ldconfigFpAb#b#b#b#def7090425803917bb478c716099ff933642baa9db8e8c0450a1811204e37a0blibplain.so.3.0.0libplain.so.3.0.0rootrootrootrootrootrootrootrootcyrus-sasl-2.1.27-150300.4.6.1.src.rpmcyrus-sasl-plain-32bitcyrus-sasl-plain-32bit(x86-32)libplain.so.3@@@@@@    /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3b~a@_I@_j^;]߶\X)@Y@@Xg@XVhT@Tw@varkoly@suse.comvarkoly@suse.comvarkoly@suse.comvarkoly@suse.comscabrero@suse.demichael@stroeder.comvarkoly@suse.comvcizek@suse.commichael@stroeder.comvarkoly@suse.combwiedemann@suse.comvarkoly@suse.comjengelh@inai.de- CVE-2022-24407: cyrus-sasl: SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036) o add upstream patch: 0001-CVE-2022-24407-Escape-password-for-SQL-insert-update.patch- postfix: sasl authentication with password fails (bsc#1194265) Add config parameter --with-dblib=gdbm - Avoid converting of /etc/sasldb2 by every update. Convert /etc/sasldb2 only if it is a Berkeley DB- CVE-2020-8032: cyrus-sasl: Local privilege escalation to root due to insecure tmp file usage. (bsc#1180669) Use /var/adm/update-scripts/ instead of /tmp. Clean up temporary files.- Remove Berkeley DB dependency (JIRA#SLE-12190) The packages cyrus-sasl and cyrus-sasl-saslauthd are built without Berkely DB support. gdbm will be used instead of BDB. The packages cyrus-sasl-bdb and cyrus-sasl-saslauthd-bdb are built with Berkely DB support. - Update to 2.1.27 * Added support for OpenSSL 1.1 * Added support for lmdb * Lots of build fixes * Treat SCRAM and DIGEST-MD5 as more secure than PLAIN when selecting client mech * DIGEST-MD5 plugin: Fixed memory leaks Fixed a segfault when looking for non-existent reauth cache Prevent client from going from step 3 back to step 2 Allow cmusaslsecretDIGEST-MD5 property to be disabled * GSSAPI plugin: Added support for retrieving negotiated SSF Fixed GSS-SPNEGO to use flags negotiated by GSSAPI for SSF Properly compute maxbufsize AFTER security layers have been set * SCRAM plugin: Added support for SCRAM-SHA-256 * LOGIN plugin: Don’t prompt client for password until requested by server * NTLM plugin: Fixed crash due to uninitialized HMAC context - Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468) - bsc#983938 `After=syslog.target` left-overs in several unit files - added patches: fix_libpq-fe_include.diff for fixing including libpq-fe.h - removed patches obsoleted by upstream changes: * shared_link_on_ppc.patch * cyrus-sasl-2.1.27-openssl-1.1.0.patch * 0002-Drop-unused-parameter-from-gssapi_spnego_ssf.patch * 0003-Check-return-error-from-gss_wrap_size_limit.patch * 0004-Add-support-for-retrieving-the-mech_ssf.patch * 0001-Fix-GSS-SPNEGO-mechanism-s-incompatible-behavior.patch * cyrus-sasl-fix-logging-in-gssapi.patch- Added support for retrieving negotiated SSF in gssapi plugin (bsc#1162518) * Add 0002-Drop-unused-parameter-from-gssapi_spnego_ssf.patch * Add 0003-Check-return-error-from-gss_wrap_size_limit.patch * Add 0004-Add-support-for-retrieving-the-mech_ssf.patch - Fixed GSS-SPNEGO to use flags negotiated by GSSAPI for SSF (bsc#1162518) * Add 0001-Fix-GSS-SPNEGO-mechanism-s-incompatible-behavior.patch- added backport-patch cyrus-sasl-bug587.patch which fixes off-by-one error in _sasl_add_string function (see CVE-2019-19906 bsc#1159635)- bnc#1044840 syslog is polluted with messages "GSSAPI client step 1" By server context the connection will be sent to the log function. Client content does not have log level information. I.e. there is no way to stop DEBUG level logs nece I've removed it. * add cyrus-sasl-fix-logging-in-gssapi.patch- OpenSSL 1.1 support (bsc#1055463) * add cyrus-sasl-2.1.27-openssl-1.1.0.patch from Fedora- added cyrus-sasl-issue-402.patch to fix SASL GSSAPI mechanism acceptor wrongly returns zero maxbufsize #402 (see https://github.com/cyrusimap/cyrus-sasl/issues/402)- bnc#1026825 saslauthd: :set_auth_mech : unknown authentication mechanism: kerberos5- really use SASLAUTHD_PARAMS variable (bnc#938657)- bnc#908883 cyrus-sasl-scram refers to wrong RFC- Make sure /usr/sbin/rcsaslauthd exists/bin/sh2.1.27-150300.4.6.12.1.27-150300.4.6.1sasl2libplain.solibplain.so.3libplain.so.3.0.0/usr/lib//usr/lib/sasl2/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:22965/SUSE_SLE-15-SP3_Update/f31563e28dd2787f23e8d4a931ea78b6-cyrus-sasl.SUSE_SLE-15-SP3_Updatecpioxz5x86_64-suse-linuxdirectoryELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=7a473a8a15a07ee73c7f1cd72c160504720231b0, strippedPRRRRRRutf-89148f4cb568817bf7dc04c3b60d11e2aea9ef9a2dec8ebf831eaadef81ae995a? 7zXZ !t/I;] crt:bLL ɳw,]^H7Khw>8p<>著$6 Ztn$4ƽR~wKZGjĺ{])"Z!spq;a*XSZv(U8FTʣ^li୦##$oKr5>^k5PWB^h}<9}By%RQ?)'|M=niO#fߓ_B_Խ*_K!n/q^\z)ئC6VJd#3Ƒ0OTTih<'D#L QiC<,=˫ԡfo=I9ADXbjVwV<3'wG*%*J N2;Rxz$fvS9 GbTg,uA= &-U]VR&nᒃ.'4 e!PRqUe6d;}`p7'#uR5r#CD {XFcYpCîyAQ16Lǎ%6+s AdBwR:'c>fjر<BAB[%]ZW-9{GOecMQ^"8w 3PTyQ1?' EcM" T!q~Yz7r*4ںfc!QKo"Kg"lgiV%)>7|7JJ_Ak^# D'RЄU⭅)xav P]9dP @̾kbF {A6r<[-?SXF_wUG:  T}{20T{Fi]Wa˓_Ng0w$QbV7=3al+~g)M;mna,\NJ_I/$E'{/d+eZ*"q3jeEt6W4z%ިPYP8ovgx4TV@3e׵.Ag(v@R-^'NntEԭǥ4#h+TC05?5U) 8 -[uv=nqZ-V6&E\7a N:6t.W!`Y&Q>zU'yI+U%G2gTޞ99+߭NS^RsBQabat틬iK|;ud@U""ޜPIIS- H銐)&WY/|ΐX$' Wٍqz|NPdE?)a$VѢOф]( eiqR*dj7{?%~0^=_ft6SG%S7i)Һr1ٴI0GOQ\Eb>:"ֽ eEwߴ7Gyއ9"]jnMQ,t+rfa 5b|q?Y¾61q^wւ]ѧ4N. 3>/ Zc]Op. =Ʌ&F[/Qثy!NDy04%vxR,.Y Z _<yU5M<)zInk՟53zRpb{弩&΀4!Yd|?@2kesl(vМn/#Lƚ#5y'켨gۻ(IÞ>DzY{HO &F$ QVҨ!s.J]܈Qk2^;Ȳw< ԉ)Ȥ<7vN5-Ƭ=ugy?db X a>G+J?=Or^4KmCK%|G'4,glF&]ɰ䷡uE.N0RIBɛE'ys7)hDD5S{xKEv $by- 3cĖ \S['7H W@Sۄ.Vp6{kh+Tԝb<^Rb {Sg7|\8:g{P,LS%tB7/dҢGrOmA%wI7bqB>U( ApIL..0 *?F~K-AOk`S탾ko1:p<\ gI-HЅf:đ ʘLASk s |x H..~VmkIf8ZwI4Kfx+ռRE2j8%Sp2=@ڶ;XhaJNq|: @^@!+NM2 \㟗0 yFz2`5 +BH 3cdPJZc~F^QPow}ccZԭtr+N`hN KE.CfĚL$3Jwi˒obNnQ5MC>!#bYm ݎ4bZ` pz:(OȅT[|޶_"04Z;z>d77K`Tu/œzk"4, r&K3TG! ˵8ԧ@KT SxhUTqih}Ȉ⋦QcGש7[`JeJoB:cǷ3  HY:.,p>N]7!152 IDӅ|yNJ֕ј yU`Y!t*,<;s#ZSdTiϫt2Pa]T\ 2r'q&#Z'OFOC {"k{]lze~02 o~vPB(dEoj %ӂ? +\VGJ]LTOm ^-YV1jö_u{Jsi\kHĿJk:Qэ~M^'tw6JHH =CzW<D^u!8BiOXD+w¬aoaqYƯH_Q*jڅ-r$9&$*N٠<ݵ90'\^kzWht"n{ص!+<А 791dzKyvpW1D M芹Ms{KN76 UrO䵳kl+}^rYbw-9N=n R"  4J1]dq}R:L`IPo 3LcyUmNPL"芣&\;'5x#KcRZ {t4}btZij<sYzF"}:-V/Z= S`vK:()Fhγ#RS35es;קTJ̽fSW~\o$j :' ⱘ5tNT#\@K/Q: g'Hn* /F qM%*רz|䏉  "4UdEmq'r=K˳G<ل`S&ˤ;W9E1XQ$-m[4٩X[Ao?f]HYB?H% < 'Ϧ+_815ܐ ǦA*,UaK 579> nXո{gٜS ȸxlwM\ŨG#(#z]ZDA-8goKFH n2Յjo Aeu |y|Vz/8sΧc՘bK&MLCDJ8E?JaJV]!G]vzh–|G[O,Q&oCr=ݙװ_Z)Ud1 ovP;xGbwld.RB^-v,s|}9V4 aÔ'I-knb(#ؿ)lC8O%9j?MχgkfТ-jMb܈O;p4d[ o?%%ZVJ hj o\?$Kt޳!GW|ya[pފz&qQ3NYoOz1IsO^eŪcZZV\Kq'fO! :`]8Vn~iw.qGMGg.]xw;.,{:4g1t(I ]8x. kѭ|eBnWV\ڻ H(rE n-˂ !nSyK8|΄7e7Ĭ6jxPFb%h'= T1 $:$*k y2P*>ulv\h맆6ԃONPsf(lj [Pka& ,0$+`\\!S;`uTu؄IIB5v&~@v3uNB irj|ZL @Wωy_c8/B4e70si%be,%@2埾C2PC ^/hdמ 6Q0cjWV8#wBƞJ|L`zy9_\4-؍ɷY ]1MCNPiXV_iGlpt}l 3 NyX҆@-T7C}}R4fURnB1*ni39{vA&) <%Cy}aI≑ nj;T= 825co3x[HUI1LXlVfRB7uێA(hEv׸"jF0Z)mNW;)Zvi&|>5@G޼Ewח׍ Zf %u)]AȘUF5V(+' M;/{ .l(*}6~{X%]䵆NtЄ>q􆽊o͆+G0|@hgvLǠ| R ,1W d.hC7Ũ䢣I?ń]DR/py_T&g **bߣq DlCݖśjNU8; RGIVڇߑ:Dy`*ݻ塼>MgLY{6#XlA[b"ͨ9B/#6l?ꟲG?`}BA6ʂ͞C\0$D羽HAZ= !CS(E&E%cw frr2)"_2}i=$..( X:s44VݛI.b<OQ恴@_Lh>nT`>iƅJ#f .xZd~\`YOP9ap=ڋNlOuHfQ3^S7 WF>7  YZ