Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP3:GA
patchinfo.3548
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.3548
<patchinfo incident="3548"> <issue id="1007766" tracker="bnc">VUL-0: CVE-2016-7032: sudo: noexec bypass via system() and popen()</issue> <issue id="1007501" tracker="bnc">VUL-0: CVE-2016-7076: sudo: noexec bypass via wordexp()</issue> <issue id="2016-7076" tracker="cve" /> <issue id="2016-7032" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>kstreitova</packager> <description> This update for sudo fixes the following issues: - fix two security vulnerabilities that allowed users to bypass sudo's NOEXEC functionality: * noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766] * noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501] </description> <summary>Security update for sudo</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor