File _patchinfo of Package patchinfo.3548
<patchinfo incident="3548">
<issue id="1007766" tracker="bnc">VUL-0: CVE-2016-7032: sudo: noexec bypass via system() and popen()</issue>
<issue id="1007501" tracker="bnc">VUL-0: CVE-2016-7076: sudo: noexec bypass via wordexp()</issue>
<issue id="2016-7076" tracker="cve" />
<issue id="2016-7032" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>kstreitova</packager>
<description>
This update for sudo fixes the following issues:
- fix two security vulnerabilities that allowed users to bypass
sudo's NOEXEC functionality:
* noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766]
* noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501]
</description>
<summary>Security update for sudo</summary>
</patchinfo>