CVE-2020-26880

NameCVE-2020-26880
DescriptionSympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs972114

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sympa (PTS)bullseye6.2.60~dfsg-4fixed
bullseye (security)6.2.60~dfsg-4+deb11u1fixed
bookworm6.2.70~dfsg-2fixed
trixie, sid6.2.76~dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sympasource(unstable)6.2.60~dfsg-2972114

Notes

[buster] - sympa <postponed> (Revisit when fixed upstream; most setups mitigated)
[stretch] - sympa <postponed> (Mitigated, revisit when fixed upstream)
https://github.com/sympa-community/sympa/issues/1009
https://github.com/sympa-community/sympa/issues/943#issuecomment-704779420
https://github.com/sympa-community/sympa/issues/943#issuecomment-704842235
Mitigation: https://salsa.debian.org/sympa-team/sympa/-/commit/b904d5257beb135127f663ad8f6865c1b59efd50
Mitigation present in 6.2.58~dfsg-2, 6.2.40~dfsg-1+deb10u1 and 6.2.16~dfsg-3+deb9u4
uploads.
Upstream's take is that the issue is considered fixed with the combination of
https://github.com/sympa-community/sympa/issues/946
https://github.com/sympa-community/sympa/issues/1086
with both changes first included in 6.2.60~dfsg-2. From Debian point of view
consider this as sufficient coverage for the CVE-2020-26880 fix.

Search for package or bug name: Reporting problems