Описание
Security update for sudo
This update for sudo fixes the following issues:
- fix two security vulnerabilities that allowed users to bypass
sudo's NOEXEC functionality:
- noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766]
- noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501]
Sudo was updated to the package from SUSE:SLE-12-SP2:Update, incorporating the following new feature:
- allow dynamic groups with sudo [fate#318850]
The following bug fixes are included:
- parse /proc/stat for boottime correctly [boo#899252]
- enable SASL authentication [boo#979531]
Список пакетов
openSUSE Leap 42.2
Ссылки
- E-Mail link for openSUSE-SU-2016:2983-1
- SUSE Security Ratings
Описание
sudo before 1.8.12 does not ensure that the TZ environment variable is associated with a zoneinfo file, which allows local users to open arbitrary files for read access (but not view file contents) by running a program within an sudo session, as demonstrated by interfering with terminal output, discarding kernel-log messages, or repositioning tape drives.
Затронутые продукты
Ссылки
- CVE-2014-9680
- SUSE Bug 917806
- SUSE Bug 919737
- SUSE Bug 921999
- SUSE Bug 953359
Описание
sudo_noexec.so in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.
Затронутые продукты
Ссылки
- CVE-2016-7032
- SUSE Bug 1007501
- SUSE Bug 1007766
- SUSE Bug 1011975
- SUSE Bug 1011976
- SUSE Bug 1149974
- SUSE Bug 1149975
Описание
sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
Затронутые продукты
Ссылки
- CVE-2016-7076
- SUSE Bug 1007501
- SUSE Bug 1011975
- SUSE Bug 1011976
- SUSE Bug 1149974
- SUSE Bug 1149975