Security update for sudo

Announcement ID: SUSE-SU-2016:2891-1
Rating: moderate
References:
Cross-References:
CVSS scores:
  • CVE-2016-7032 ( NVD ): 7.0 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2016-7076 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
  • SLES for SAP Applications 11-SP4
  • SUSE Linux Enterprise Server 11 SP4

An update that solves two vulnerabilities and has three security fixes can now be installed.

Description:

This update for sudo fixes the following issues:

  • Fix two security vulnerabilities that allowed users to bypass sudo's NOEXEC functionality:
  • noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766]
  • noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501]

  • The SSSD plugin would occasionally crash sudo with an "internal error". This issue has been fixed. [bsc#948973]

  • The SSSD plugin would occasionally apply @netgroups rules from LDAP to all users rather than the @netgroup. This issue is now fixed. [bsc#966755]

  • When the SSSD plugin was used and a local user ran sudo, an e-mail used to be sent to administrator because SSSD did not support sudo rules for local users. This message did not signify an error, however, it was only noise. [bsc#1008043]

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server 11 SP4
    zypper in -t patch slessp4-sudo-12852=1
  • SLES for SAP Applications 11-SP4
    zypper in -t patch slessp4-sudo-12852=1

Package List:

  • SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
    • sudo-1.7.6p2-0.29.1
  • SLES for SAP Applications 11-SP4 (ppc64 x86_64)
    • sudo-1.7.6p2-0.29.1

References: