[Secure-testing-team] Bug#842507: sudo: CVE-2016-7076: noexec bypass via wordexp()

Salvatore Bonaccorso carnil at debian.org
Sat Oct 29 20:25:14 UTC 2016


Source: sudo
Version: 1.8.10p3-1
Severity: important
Tags: security upstream patch fixed-upstream

Hi,

the following vulnerability was published for sudo.

CVE-2016-7076[0]:
noexec bypass via wordexp()

>From the NEWS entry:

When sudo_noexec.so is used, the WRDE_NOCMD flag is now added if the
wordexp() function is called. This prevents commands from being run via
wordexp() without disabling it entirely. 

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-7076
[1] https://www.sudo.ws/repos/sudo/rev/e7d09243e51b,
    https://www.sudo.ws/repos/sudo/rev/7b8357b0a358,
    https://www.sudo.ws/repos/sudo/rev/167a518d8129

Regards,
Salvatore



More information about the Secure-testing-team mailing list