First published: Mon Sep 28 2020(Updated: )
USN-3968-1 fixed several vulnerabilities in Sudo. This update provides the corresponding update for Ubuntu 14.04 ESM. Original advisory details: Florian Weimer discovered that Sudo incorrectly handled the noexec restriction when used with certain applications. A local attacker could possibly use this issue to bypass configured restrictions and execute arbitrary commands. (CVE-2016-7076, CVE-2016-7032)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/sudo-ldap | <1.8.9p5-1ubuntu1.5+esm5 | 1.8.9p5-1ubuntu1.5+esm5 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/sudo | <1.8.9p5-1ubuntu1.5+esm5 | 1.8.9p5-1ubuntu1.5+esm5 |
Ubuntu OpenSSH Client | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of USN-3968-3 is CVE-2016-7032 and CVE-2016-7076.
The severity of CVE-2016-7032 and CVE-2016-7076 is not specified in the information provided.
To fix the Sudo vulnerabilities, you need to update the sudo-ldap and sudo packages to version 1.8.9p5-1ubuntu1.5+esm5 or later.
You can find more information about USN-3968-1 in the Ubuntu security notices.
Yes, Ubuntu 14.04 is affected by the Sudo vulnerabilities.