Check: RHSA-2016:2872
RHEL6 OVAL:
RHSA-2016:2872
(in version v1 r2)
Title
sudo Security Update (Cat II impact)
Discussion
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * It was discovered that the sudo noexec restriction could have been bypassed if application run via sudo executed system(), popen(), or wordexp() C library functions with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could use these flaws to execute arbitrary commands with elevated privileges. (CVE-2016-7032, CVE-2016-7076) Issue Date: 2016-12-06
Check Content
Run the following commands to determine which version of sudo or sudo-devel is installed: # rpm -qi sudo # rpm -qi sudo-devel If any of the above packages are installed, check the Version/Release and Key ID. If the Version/Release is earlier than 1.8.6p3-25.el6_8 and the Key ID is 199e2f91fd431d51, this is a finding.
Fix Text
Upgrade sudo packages to a version greater than 1.8.6p3-25.el6_8
Additional Identifiers
Rule ID:
Vulnerability ID: CVE-2016-7032
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |