Debian Package Tracker
Register | Log in
Subscribe

sogo

Scalable groupware server

Choose email to subscribe with

general
  • source: sogo (main)
  • version: 5.12.8-1
  • maintainer: Debian SOGo Maintainers (archive) (DMD)
  • uploaders: Jordi Mallach [DMD] – Jeroen Dekkers [DMD]
  • arch: all any
  • std-ver: 4.7.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 5.0.1-4+deb11u1
  • o-o-sec: 5.0.1-4+deb11u3
  • oldstable: 5.8.0-2+deb12u2
  • stable: 5.12.1-3+deb13u1
  • testing: 5.12.8-1
  • unstable: 5.12.8-1
versioned links
  • 5.0.1-4+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.0.1-4+deb11u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.8.0-2+deb12u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.12.1-3+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.12.8-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • sogo (9 bugs: 0, 7, 2, 0)
  • sogo-activesync
  • sogo-common
action needed
5 security issues in trixie high

There are 5 open security issues in trixie.

5 important issues:
  • CVE-2026-3054: A vulnerability was identified in Alinto SOGo 5.12.3/5.12.4. This impacts an unknown function. The manipulation of the argument hint leads to cross site scripting. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
  • CVE-2026-8496: A cross-site scripting (XSS) vulnerability exists in Alinto SOGo, version 5.12.7. A maliciously crafted ICS calendar invitation files allows arbitrary JavaScript execution within the authenticated SOGo webmail session. The issue occurs because SVG content embedded in the description field of an ICS file, with an onrepeat event handler, is insufficiently sanitized before being rendered in the webmail interface. A remote attacker can execute JavaScript in the victim's browser when the malicious calendar invite is viewed. Successful exploitation may allow mailbox access, email and contact theft, session hijacking, and other actions allowed by an authenticated user.
  • CVE-2026-8851: SOGo 5.12.7 contains a SQL injection vulnerability in the Access Control List management functionality that allows authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUserInAcls endpoint. Attackers can inject malicious SQL code to write extracted data into the sogo_acl table and retrieve it through the /acls API, establishing an out-of-band data exfiltration channel.
  • CVE-2025-71276: SOGo before 5.12.5 is prone to a XSS vulnerability with events, tasks, and contacts categories.
  • CVE-2026-33550: SOGo before 5.12.5 does not renew the OTP if a user disables/enables it, and has a too short length (only 12 digits instead of the 20 recommended).
2 issues that should be fixed with the next stable update:
  • CVE-2026-46445: SOGo before 5.12.7, when PostgreSQL is used, allows SQL injection.
  • CVE-2026-46446: SOGo before 5.12.7, when PostgreSQL or MariaDB is used, and cleartext passwords are stored, allows SQL injection. This is related to c_password = '%@' in changePasswordForLogin.
Created: 2026-02-24 Last update: 2026-05-19 11:31
11 security issues in bullseye high

There are 11 open security issues in bullseye.

4 important issues:
  • CVE-2026-8496: A cross-site scripting (XSS) vulnerability exists in Alinto SOGo, version 5.12.7. A maliciously crafted ICS calendar invitation files allows arbitrary JavaScript execution within the authenticated SOGo webmail session. The issue occurs because SVG content embedded in the description field of an ICS file, with an onrepeat event handler, is insufficiently sanitized before being rendered in the webmail interface. A remote attacker can execute JavaScript in the victim's browser when the malicious calendar invite is viewed. Successful exploitation may allow mailbox access, email and contact theft, session hijacking, and other actions allowed by an authenticated user.
  • CVE-2026-8851: SOGo 5.12.7 contains a SQL injection vulnerability in the Access Control List management functionality that allows authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUserInAcls endpoint. Attackers can inject malicious SQL code to write extracted data into the sogo_acl table and retrieve it through the /acls API, establishing an out-of-band data exfiltration channel.
  • CVE-2026-46445: SOGo before 5.12.7, when PostgreSQL is used, allows SQL injection.
  • CVE-2026-46446: SOGo before 5.12.7, when PostgreSQL or MariaDB is used, and cleartext passwords are stored, allows SQL injection. This is related to c_password = '%@' in changePasswordForLogin.
3 issues postponed or untriaged:
  • CVE-2026-3054: (postponed; to be fixed through a stable update) A vulnerability was identified in Alinto SOGo 5.12.3/5.12.4. This impacts an unknown function. The manipulation of the argument hint leads to cross site scripting. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
  • CVE-2025-71276: (postponed; to be fixed through a stable update) SOGo before 5.12.5 is prone to a XSS vulnerability with events, tasks, and contacts categories.
  • CVE-2026-33550: (postponed; to be fixed through a stable update) SOGo before 5.12.5 does not renew the OTP if a user disables/enables it, and has a too short length (only 12 digits instead of the 20 recommended).
4 ignored issues:
  • CVE-2022-4556: A vulnerability was found in Alinto SOGo up to 5.7.1 and classified as problematic. Affected by this issue is the function _migrateMailIdentities of the file SoObjects/SOGo/SOGoUserDefaults.m of the component Identity Handler. The manipulation of the argument fullName leads to cross site scripting. The attack may be launched remotely. Upgrading to version 5.8.0 is able to address this issue. The name of the patch is efac49ae91a4a325df9931e78e543f707a0f8e5e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215960.
  • CVE-2022-4558: A vulnerability was found in Alinto SOGo up to 5.7.1. It has been classified as problematic. This affects an unknown part of the file SoObjects/SOGo/NSString+Utilities.m of the component Folder/Mail Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 5.8.0 is able to address this issue. The name of the patch is 1e0f5f00890f751e84d67be4f139dd7f00faa5f3. It is recommended to upgrade the affected component. The identifier VDB-215961 was assigned to this vulnerability.
  • CVE-2023-48104: Alinto SOGo before 5.9.1 is vulnerable to HTML Injection.
  • CVE-2024-24510: Cross Site Scripting vulnerability in Alinto SOGo before 5.10.0 allows a remote attacker to execute arbitrary code via the import function to the mail component.
Created: 2026-05-14 Last update: 2026-05-19 11:31
7 security issues in bookworm high

There are 7 open security issues in bookworm.

7 important issues:
  • CVE-2026-3054: A vulnerability was identified in Alinto SOGo 5.12.3/5.12.4. This impacts an unknown function. The manipulation of the argument hint leads to cross site scripting. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
  • CVE-2026-8496: A cross-site scripting (XSS) vulnerability exists in Alinto SOGo, version 5.12.7. A maliciously crafted ICS calendar invitation files allows arbitrary JavaScript execution within the authenticated SOGo webmail session. The issue occurs because SVG content embedded in the description field of an ICS file, with an onrepeat event handler, is insufficiently sanitized before being rendered in the webmail interface. A remote attacker can execute JavaScript in the victim's browser when the malicious calendar invite is viewed. Successful exploitation may allow mailbox access, email and contact theft, session hijacking, and other actions allowed by an authenticated user.
  • CVE-2026-8851: SOGo 5.12.7 contains a SQL injection vulnerability in the Access Control List management functionality that allows authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUserInAcls endpoint. Attackers can inject malicious SQL code to write extracted data into the sogo_acl table and retrieve it through the /acls API, establishing an out-of-band data exfiltration channel.
  • CVE-2025-71276: SOGo before 5.12.5 is prone to a XSS vulnerability with events, tasks, and contacts categories.
  • CVE-2026-33550: SOGo before 5.12.5 does not renew the OTP if a user disables/enables it, and has a too short length (only 12 digits instead of the 20 recommended).
  • CVE-2026-46445: SOGo before 5.12.7, when PostgreSQL is used, allows SQL injection.
  • CVE-2026-46446: SOGo before 5.12.7, when PostgreSQL or MariaDB is used, and cleartext passwords are stored, allows SQL injection. This is related to c_password = '%@' in changePasswordForLogin.
Created: 2026-02-24 Last update: 2026-05-19 11:31
Marked for autoremoval on 15 June due to libmemcached: #1135503 high
Version 5.12.8-1 of sogo is marked for autoremoval from testing on Mon 15 Jun 2026. It depends (transitively) on libmemcached, affected by #1135503. You should try to prevent the removal by fixing these RC bugs.
Created: 2026-05-09 Last update: 2026-05-19 10:30
debian/patches: 1 patch with invalid metadata, 11 patches to forward upstream high

Among the 14 debian patches available in version 5.12.8-1 of the package, we noticed the following issues:

  • 1 patch with invalid metadata that ought to be fixed.
  • 11 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-05-12 18:05
lintian reports 1 error and 198 warnings high
Lintian reports 1 error and 198 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-03-25 Last update: 2026-04-07 23:31
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2025-07-28 Last update: 2026-05-19 11:31
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2026-04-06 Last update: 2026-05-19 11:30
version in VCS is newer than in repository, is it time to upload? normal
vcswatch reports that this package seems to have a new changelog entry (version 5.12.8-2, distribution UNRELEASED) and new commits in its VCS. You should consider whether it's time to make an upload.

Here are the relevant commit messages:
commit 88ead8fc76ee07739f24c83a8df8fbccc25b5a6f
Author: Jordi Mallach <jordi@mallach.net>
Date:   Tue May 12 14:25:34 2026 +0200

    Update changelog.

commit 3afca53c689166232b895198d80e4d3d5fa523d0
Author: Jordi Mallach <jordi@mallach.net>
Date:   Tue May 12 14:24:15 2026 +0200

    Only disable test_rendering patch on big endian architectures.

commit 8c8f64c27e75918995b6d1754140cb0d938288a6
Author: Jordi Mallach <jordi@mallach.net>
Date:   Tue May 12 13:51:38 2026 +0200

    Expect no test failures after the fixed test.

commit f67678bc13b9695a401b390ab59a421428c67024
Author: Jordi Mallach <jordi@mallach.net>
Date:   Tue May 12 13:51:13 2026 +0200

    Workaround MIME address generation test failure.
    
    This failed in environments like a Debian sbuild or pbuilder chroot.
Created: 2026-03-25 Last update: 2026-05-18 00:04
testing migrations
  • This package will soon be part of the auto-openssl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2026-05-17] sogo 5.12.8-1 MIGRATED to testing (Debian testing watch)
  • [2026-05-12] Accepted sogo 5.12.8-1 (source) into unstable (Jordi Mallach)
  • [2026-04-06] sogo 5.12.7-1 MIGRATED to testing (Debian testing watch)
  • [2026-04-01] Accepted sogo 5.12.7-1 (source) into unstable (Jordi Mallach)
  • [2026-03-31] sogo 5.12.6-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-25] Accepted sogo 5.12.6-1 (source) into unstable (Jordi Mallach)
  • [2026-01-06] Accepted sogo 5.0.1-4+deb11u3 (source) into oldoldstable-security (Tobias Frost)
  • [2026-01-04] Accepted sogo 5.8.0-2+deb12u2 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Tobias Frost)
  • [2026-01-04] Accepted sogo 5.8.0-2+deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Tobias Frost)
  • [2026-01-01] Accepted sogo 5.12.1-3+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Tobias Frost)
  • [2025-12-28] sogo 5.12.4-1.2 MIGRATED to testing (Debian testing watch)
  • [2025-12-26] Accepted sogo 5.12.4-1.2 (source) into unstable (Tobias Frost)
  • [2025-12-23] sogo 5.12.4-1.1 MIGRATED to testing (Debian testing watch)
  • [2025-12-17] Accepted sogo 5.12.4-1.1 (source) into unstable (Adrian Bunk)
  • [2025-11-28] Accepted sogo 5.0.1-4+deb11u2 (source) into oldoldstable-security (Paride Legovini)
  • [2025-10-25] sogo 5.12.4-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-19] Accepted sogo 5.12.4-1 (source) into unstable (Jordi Mallach)
  • [2025-09-29] sogo 5.12.3-2 MIGRATED to testing (Debian testing watch)
  • [2025-09-23] Accepted sogo 5.12.3-2 (source) into unstable (Jordi Mallach)
  • [2025-08-18] Accepted sogo 5.12.3-1 (source) into experimental (Jordi Mallach)
  • [2025-07-27] sogo 5.12.1-3 MIGRATED to testing (Debian testing watch)
  • [2025-07-25] Accepted sogo 5.12.1-3 (source) into unstable (Jordi Mallach)
  • [2025-06-14] sogo 5.12.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-06-09] Accepted sogo 5.12.1-2 (source) into unstable (Jordi Mallach)
  • [2025-05-15] sogo 5.12.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-05-04] Accepted sogo 5.12.1-1 (source) into unstable (Jordi Mallach)
  • [2025-03-30] sogo 5.12.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-03-24] Accepted sogo 5.12.0-1 (source) into unstable (Jordi Mallach)
  • [2025-02-22] sogo 5.11.2-4 MIGRATED to testing (Debian testing watch)
  • [2025-02-19] Accepted sogo 5.11.2-4 (source) into unstable (Jordi Mallach)
  • 1
  • 2
bugs [bug history graph]
  • all: 11
  • RC: 0
  • I&N: 8
  • M&W: 2
  • F&P: 1
  • patch: 1
links
  • homepage
  • lintian (1, 198)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • screenshots
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 5.12.4-1.2
  • 5 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing