[Secure-testing-team] Bug#842507: sudo: CVE-2016-7076: noexec bypass via wordexp()
Salvatore Bonaccorso
carnil at debian.org
Sat Oct 29 20:25:14 UTC 2016
Source: sudo
Version: 1.8.10p3-1
Severity: important
Tags: security upstream patch fixed-upstream
Hi,
the following vulnerability was published for sudo.
CVE-2016-7076[0]:
noexec bypass via wordexp()
>From the NEWS entry:
When sudo_noexec.so is used, the WRDE_NOCMD flag is now added if the
wordexp() function is called. This prevents commands from being run via
wordexp() without disabling it entirely.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2016-7076
[1] https://www.sudo.ws/repos/sudo/rev/e7d09243e51b,
https://www.sudo.ws/repos/sudo/rev/7b8357b0a358,
https://www.sudo.ws/repos/sudo/rev/167a518d8129
Regards,
Salvatore
More information about the Secure-testing-team
mailing list