File _patchinfo of Package patchinfo.3548
<patchinfo incident="3548"> <issue id="1007766" tracker="bnc">VUL-0: CVE-2016-7032: sudo: noexec bypass via system() and popen()</issue> <issue id="1007501" tracker="bnc">VUL-0: CVE-2016-7076: sudo: noexec bypass via wordexp()</issue> <issue id="2016-7076" tracker="cve" /> <issue id="2016-7032" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>kstreitova</packager> <description> This update for sudo fixes the following issues: - fix two security vulnerabilities that allowed users to bypass sudo's NOEXEC functionality: * noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766] * noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501] </description> <summary>Security update for sudo</summary> </patchinfo>