Description in Sudo before 1.8.15 on Linux might allow local users to
bypass intended noexec command restrictions via an application that calls
the (1) system or (2) popen function.
 sarnold> I'm marking this negligible because this feature seems doomed
  to failure in the general case. Any sort of memory-protection flaws
  in the target process, or ability to execute system calls directly,
  or programs that don't use the standard C libraries, etc. won't be
  affected by this feature.
 sarnold> If you rely upon this feature I suggest instead seccomp2-based
  filters to disable the execve() and execveat() system calls at the
  kernel interface or AppArmor (or other MAC system) to restrict which
  executables can be executed.
Source: sudo (LP Ubuntu Debian)
Upstream:released (1.8.15-1)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (1.8.16-0ubuntu1.2)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected
Ubuntu 19.04 (Disco Dingo):not-affected
More Information

Updated: 2019-01-14 21:20:01 UTC (commit 51f9b73af244ba86b9321e46e526586c25a8e060)