NameCVE-2016-7032 in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sudo (PTS)buster1.8.27-1+deb10u3fixed
buster (security)1.8.27-1+deb10u5fixed
bullseye (security), bullseye1.9.5p2-3+deb11u1fixed
bookworm, sid1.9.13p3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[jessie] - sudo <no-dsa> (Minor issue)
This CVE is for the bypass via system() and popen(). The wordpexp() bypass
is tracked under CVE-2016-7076.

Search for package or bug name: Reporting problems