Name | CVE-2020-26880 |
Description | Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 972114 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
sympa (PTS) | bullseye | 6.2.60~dfsg-4 | fixed |
| bullseye (security) | 6.2.60~dfsg-4+deb11u1 | fixed |
| bookworm | 6.2.70~dfsg-2 | fixed |
| trixie, sid | 6.2.76~dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
sympa | source | (unstable) | 6.2.60~dfsg-2 | | | 972114 |
Notes
[buster] - sympa <postponed> (Revisit when fixed upstream; most setups mitigated)
[stretch] - sympa <postponed> (Mitigated, revisit when fixed upstream)
https://github.com/sympa-community/sympa/issues/1009
https://github.com/sympa-community/sympa/issues/943#issuecomment-704779420
https://github.com/sympa-community/sympa/issues/943#issuecomment-704842235
Mitigation: https://salsa.debian.org/sympa-team/sympa/-/commit/b904d5257beb135127f663ad8f6865c1b59efd50
Mitigation present in 6.2.58~dfsg-2, 6.2.40~dfsg-1+deb10u1 and 6.2.16~dfsg-3+deb9u4
uploads.
Upstream's take is that the issue is considered fixed with the combination of
https://github.com/sympa-community/sympa/issues/946
https://github.com/sympa-community/sympa/issues/1086
with both changes first included in 6.2.60~dfsg-2. From Debian point of view
consider this as sufficient coverage for the CVE-2020-26880 fix.