SUSE-SU-2016:2891-1: moderate: Security update for sudo

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Nov 23 11:07:14 MST 2016


   SUSE Security Update: Security update for sudo
______________________________________________________________________________

Announcement ID:    SUSE-SU-2016:2891-1
Rating:             moderate
References:         #1007501 #1007766 #1008043 #948973 #966755 
                    
Cross-References:   CVE-2016-7032 CVE-2016-7076
Affected Products:
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that solves two vulnerabilities and has three
   fixes is now available.

Description:


   This update for sudo fixes the following issues:

   - Fix two security vulnerabilities that allowed users to bypass sudo's
     NOEXEC functionality:
     * noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766]
     * noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501]

   - The SSSD plugin would occasionally crash sudo with an "internal error".
     This issue has been fixed. [bsc#948973]

   - The SSSD plugin would occasionally apply @netgroups rules from LDAP to
     all users rather than the @netgroup. This issue is now fixed.
     [bsc#966755]

   - When the SSSD plugin was used and a local user ran sudo, an e-mail used
     to be sent to administrator because SSSD did not support sudo rules for
     local users. This message did not signify an error, however, it was only
     noise. [bsc#1008043]


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-sudo-12852=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-sudo-12852=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      sudo-1.7.6p2-0.29.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      sudo-debuginfo-1.7.6p2-0.29.1
      sudo-debugsource-1.7.6p2-0.29.1


References:

   https://www.suse.com/security/cve/CVE-2016-7032.html
   https://www.suse.com/security/cve/CVE-2016-7076.html
   https://bugzilla.suse.com/1007501
   https://bugzilla.suse.com/1007766
   https://bugzilla.suse.com/1008043
   https://bugzilla.suse.com/948973
   https://bugzilla.suse.com/966755



More information about the sle-security-updates mailing list