File _patchinfo of Package patchinfo.3548

<patchinfo incident="3548">
  <issue id="1007766" tracker="bnc">VUL-0: CVE-2016-7032: sudo: noexec bypass via system() and popen()</issue>
  <issue id="1007501" tracker="bnc">VUL-0: CVE-2016-7076: sudo: noexec bypass via wordexp()</issue>
  <issue id="2016-7076" tracker="cve" />
  <issue id="2016-7032" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>kstreitova</packager>
  <description>
This update for sudo fixes the following issues:

- fix two security vulnerabilities that allowed users to bypass
  sudo's NOEXEC functionality:
  * noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766]
  * noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501]
</description>
  <summary>Security update for sudo</summary>
</patchinfo>
openSUSE Build Service is sponsored by