Security update for sudo

SUSE Security Update: Security update for sudo
Announcement ID: SUSE-SU-2016:2893-1
Rating: moderate
References: #1007501 #1007766
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 12-SP2
  • SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
  • SUSE Linux Enterprise Server 12-SP2
  • SUSE Linux Enterprise Desktop 12-SP2

  • An update that fixes two vulnerabilities is now available.

    Description:


    This update for sudo fixes the following issues:

    - fix two security vulnerabilities that allowed users to bypass sudo's
    NOEXEC functionality:
    * noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766]
    * noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501]

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 12-SP2:
      zypper in -t patch SUSE-SLE-SDK-12-SP2-2016-1686=1
    • SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
      zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1686=1
    • SUSE Linux Enterprise Server 12-SP2:
      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1686=1
    • SUSE Linux Enterprise Desktop 12-SP2:
      zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1686=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
      • sudo-debuginfo-1.8.10p3-8.1
      • sudo-debugsource-1.8.10p3-8.1
      • sudo-devel-1.8.10p3-8.1
    • SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
      • sudo-1.8.10p3-8.1
      • sudo-debuginfo-1.8.10p3-8.1
      • sudo-debugsource-1.8.10p3-8.1
    • SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
      • sudo-1.8.10p3-8.1
      • sudo-debuginfo-1.8.10p3-8.1
      • sudo-debugsource-1.8.10p3-8.1
    • SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
      • sudo-1.8.10p3-8.1
      • sudo-debuginfo-1.8.10p3-8.1
      • sudo-debugsource-1.8.10p3-8.1

    References: