cyrus-sasl

Description:The Cyrus SASL (Simple Authentication and Security Layer)
License: BSD-with-attribution
Homepage:https://www.cyrusimap.org/sasl/
Location:Portage
Legend:
  • + - stable
  • ~ - unstable
  • M - hardmask
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
2.1.28-r4 ~ + + + ~ - ~ ~ + ~ - + +

USE flags

  • abi_mips_n32 - 64-bit (32-bit pointer) libraries
  • abi_mips_n64 - 64-bit libraries
  • abi_mips_o32 - 32-bit libraries
  • abi_s390_32 - 32-bit (s390) libraries
  • abi_s390_64 - 64-bit (s390x) libraries
  • abi_x86_32 - 32-bit (x86) libraries
  • abi_x86_64 - 64-bit (amd64) libraries
  • abi_x86_x32 - x32 ABI libraries
  • authdaemond - Add Courier-IMAP authdaemond unix socket support (net-mail/courier-imap, mail-mta/courier)
  • berkdb - Add support for sys-libs/db (Berkeley DB for MySQL)
  • gdbm - Add support for sys-libs/gdbm (GNU database libraries)
  • kerberos - Add kerberos support
  • ldapdb - Enable ldapdb plugin
  • mysql - Add mySQL Database support
  • openldap - Add ldap support for saslauthd
  • pam - Add support for PAM (Pluggable Authentication Modules) - DANGEROUS to arbitrarily flip
  • postgres - Add support for the postgresql database
  • sample - Enable sample client and server
  • selinux - !!internal use only!! Security Enhanced Linux support, this must be set by the selinux profile or breakage will occur
  • sqlite - Add support for sqlite - embedded sql database
  • srp - Enable SRP authentication
  • ssl - Add support for SSL/TLS connections (Secure Socket Layer / Transport Layer Security)
  • static-libs - Build static versions of dynamic libraries as well
  • urandom - Use /dev/urandom instead of /dev/random

Security Advisory

Date Severity Title
about 11 years normal Cyrus-SASL: Denial of Service
over 15 years high Cyrus-SASL: Execution of arbitrary code
over 18 years normal Cyrus-SASL: DIGEST-MD5 Pre-Authentication Denial of Service
about 20 years high Cyrus-SASL: Buffer overflow and SASL_PATH vulnerabilities

Also available in: Atom

Thank you!