Описание
Security update for sudo
This update for sudo fixes the following issues:
- fix two security vulnerabilities that allowed users to bypass
sudo's NOEXEC functionality:
- noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766]
- noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501]
Список пакетов
SUSE Linux Enterprise Desktop 12 SP2
sudo-1.8.10p3-8.1
SUSE Linux Enterprise Server 12 SP2
sudo-1.8.10p3-8.1
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
sudo-1.8.10p3-8.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
sudo-1.8.10p3-8.1
SUSE Linux Enterprise Software Development Kit 12 SP2
sudo-devel-1.8.10p3-8.1
Ссылки
- Link for SUSE-SU-2016:2893-1
- E-Mail link for SUSE-SU-2016:2893-1
- SUSE Security Ratings
- SUSE Bug 1007501
- SUSE Bug 1007766
- SUSE CVE CVE-2016-7032 page
- SUSE CVE CVE-2016-7076 page
Описание
sudo_noexec.so in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.
Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:sudo-1.8.10p3-8.1
SUSE Linux Enterprise Server 12 SP2:sudo-1.8.10p3-8.1
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:sudo-1.8.10p3-8.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2:sudo-1.8.10p3-8.1
Ссылки
- CVE-2016-7032
- SUSE Bug 1007501
- SUSE Bug 1007766
- SUSE Bug 1011975
- SUSE Bug 1011976
Описание
sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:sudo-1.8.10p3-8.1
SUSE Linux Enterprise Server 12 SP2:sudo-1.8.10p3-8.1
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:sudo-1.8.10p3-8.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2:sudo-1.8.10p3-8.1
Ссылки
- CVE-2016-7076
- SUSE Bug 1007501
- SUSE Bug 1011975
- SUSE Bug 1011976