SUSE-SU-2016:2891-1: moderate: Security update for sudo
    sle-updates at lists.suse.com 
    sle-updates at lists.suse.com
       
    Wed Nov 23 11:07:14 MST 2016
    
    
  
   SUSE Security Update: Security update for sudo
______________________________________________________________________________
Announcement ID:    SUSE-SU-2016:2891-1
Rating:             moderate
References:         #1007501 #1007766 #1008043 #948973 #966755 
                    
Cross-References:   CVE-2016-7032 CVE-2016-7076
Affected Products:
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
   An update that solves two vulnerabilities and has three
   fixes is now available.
Description:
   This update for sudo fixes the following issues:
   - Fix two security vulnerabilities that allowed users to bypass sudo's
     NOEXEC functionality:
     * noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766]
     * noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501]
   - The SSSD plugin would occasionally crash sudo with an "internal error".
     This issue has been fixed. [bsc#948973]
   - The SSSD plugin would occasionally apply @netgroups rules from LDAP to
     all users rather than the @netgroup. This issue is now fixed.
     [bsc#966755]
   - When the SSSD plugin was used and a local user ran sudo, an e-mail used
     to be sent to administrator because SSSD did not support sudo rules for
     local users. This message did not signify an error, however, it was only
     noise. [bsc#1008043]
Patch Instructions:
   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:
   - SUSE Linux Enterprise Server 11-SP4:
      zypper in -t patch slessp4-sudo-12852=1
   - SUSE Linux Enterprise Debuginfo 11-SP4:
      zypper in -t patch dbgsp4-sudo-12852=1
   To bring your system up-to-date, use "zypper patch".
Package List:
   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      sudo-1.7.6p2-0.29.1
   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      sudo-debuginfo-1.7.6p2-0.29.1
      sudo-debugsource-1.7.6p2-0.29.1
References:
   https://www.suse.com/security/cve/CVE-2016-7032.html
   https://www.suse.com/security/cve/CVE-2016-7076.html
   https://bugzilla.suse.com/1007501
   https://bugzilla.suse.com/1007766
   https://bugzilla.suse.com/1008043
   https://bugzilla.suse.com/948973
   https://bugzilla.suse.com/966755
    
    
More information about the sle-updates
mailing list