Updated sudo packages fix security vulnerability
Publication date: 17 Nov 2016Modification date: 17 Nov 2016
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-7076
Description
It was discovered that the sudo noexec restriction could have been bypassed if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges (CVE-2016-7076).
References
- https://bugs.mageia.org/show_bug.cgi?id=19762
- https://www.sudo.ws/alerts/noexec_wordexp.html
- https://www.sudo.ws/stable.html#1.8.18p1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/DBELDP5KT7URCP7P3RQFYBBKPBNLAJY6/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7076
SRPMS
5/core
- sudo-1.8.18p1-1.mga5