NameCVE-2016-7032 in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sudo (PTS)stretch1.8.19p1-2.1+deb9u2fixed
stretch (security)1.8.19p1-2.1+deb9u3fixed
buster, buster (security)1.8.27-1+deb10u3fixed
bookworm, sid, bullseye1.9.5p2-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[jessie] - sudo <no-dsa> (Minor issue)
This CVE is for the bypass via system() and popen(). The wordpexp() bypass
is tracked under CVE-2016-7076.

Search for package or bug name: Reporting problems