Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-8169 (GCVE-0-2014-8169)
Vulnerability from cvelistv5
Published
2015-03-18 16:00
Modified
2024-08-06 13:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:10:51.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2579-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2579-1" }, { "name": "RHSA-2015:1344", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1344.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192565" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "openSUSE-SU-2015:0475", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html" }, { "name": "73211", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73211" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=917977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-02T00:00:00", "descriptions": [ { "lang": "en", "value": "automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user\u0027s USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-2579-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2579-1" }, { "name": "RHSA-2015:1344", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1344.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192565" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "openSUSE-SU-2015:0475", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html" }, { "name": "73211", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73211" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=917977" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-8169", "datePublished": "2015-03-18T16:00:00", "dateReserved": "2014-10-10T00:00:00", "dateUpdated": "2024-08-06T13:10:51.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-8169\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2015-03-18T16:59:00.063\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user\u0027s USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.\"},{\"lang\":\"es\",\"value\":\"automount 5.0.8, cuando una mapa de programa utilice ciertos lenguajes interpretados, utiliza los valores de las variables de entorno USER y HOME del usuario llamante en lugar de los valores del usuario utilizados para hacer funcionar el programa mapeado, lo que permite a usuarios locales ganar privilegios a trav\u00e9s de un programa troyano en el directorio de inicio del usuario.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":4.4,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2FAC325-6EEB-466D-9EBA-8ED4DBC9CFBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:automount_project:automount:5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2203531-156F-47BB-82BE-6C58EC4412B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03117DF1-3BEC-4B8D-AD63-DBBDB2126081\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1344.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/73211\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2579-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1192565\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=917977\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1344.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/73211\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2579-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1192565\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=917977\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]}]}}" } }
gsd-2014-8169
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2014-8169", "description": "automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user\u0027s USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.", "id": "GSD-2014-8169", "references": [ "https://www.suse.com/security/cve/CVE-2014-8169.html", "https://access.redhat.com/errata/RHSA-2015:2417", "https://access.redhat.com/errata/RHSA-2015:1344", "https://alas.aws.amazon.com/cve/html/CVE-2014-8169.html", "https://linux.oracle.com/cve/CVE-2014-8169.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-8169" ], "details": "automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user\u0027s USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.", "id": "GSD-2014-8169", "modified": "2023-12-13T01:22:48.852029Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-8169", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user\u0027s USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2015-1344.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2015-1344.html" }, { "name": "http://www.securityfocus.com/bid/73211", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/73211" }, { "name": "http://www.ubuntu.com/usn/USN-2579-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-2579-1" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=917977", "refsource": "MISC", "url": "https://bugzilla.suse.com/show_bug.cgi?id=917977" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1192565", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192565" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:automount_project:automount:5.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-8169" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user\u0027s USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1192565", "refsource": "CONFIRM", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192565" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=917977", "refsource": "CONFIRM", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=917977" }, { "name": "openSUSE-SU-2015:0475", "refsource": "SUSE", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html" }, { "name": "RHSA-2015:1344", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1344.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "73211", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/73211" }, { "name": "USN-2579-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2579-1" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T00:44Z", "publishedDate": "2015-03-18T16:59Z" } } }
fkie_cve-2014-8169
Vulnerability from fkie_nvd
Published
2015-03-18 16:59
Modified
2025-04-12 10:46
Severity ?
Summary
automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html | Vendor Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-1344.html | Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/73211 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2579-1 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1192565 | Issue Tracking | |
secalert@redhat.com | https://bugzilla.suse.com/show_bug.cgi?id=917977 | Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1344.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/73211 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2579-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1192565 | Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.suse.com/show_bug.cgi?id=917977 | Issue Tracking |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_hpc_node | 6.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_workstation | 6.0 | |
automount_project | automount | 5.0.8 | |
opensuse | opensuse | 13.1 | |
opensuse | opensuse | 13.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2FAC325-6EEB-466D-9EBA-8ED4DBC9CFBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:automount_project:automount:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E2203531-156F-47BB-82BE-6C58EC4412B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user\u0027s USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory." }, { "lang": "es", "value": "automount 5.0.8, cuando una mapa de programa utilice ciertos lenguajes interpretados, utiliza los valores de las variables de entorno USER y HOME del usuario llamante en lugar de los valores del usuario utilizados para hacer funcionar el programa mapeado, lo que permite a usuarios locales ganar privilegios a trav\u00e9s de un programa troyano en el directorio de inicio del usuario." } ], "id": "CVE-2014-8169", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-03-18T16:59:00.063", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1344.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/73211" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2579-1" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192565" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=917977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1344.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/73211" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2579-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=917977" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2015:1020-1
Vulnerability from csaf_suse
Published
2015-03-02 14:50
Modified
2015-03-02 14:50
Summary
Security update for autofs
Notes
Title of the patch
Security update for autofs
Description of the patch
autofs was updated to fix one security issue.
This security issue was fixed:
- CVE-2014-8169: Prevent potential privilege escalation via interpreter load path for program-based automount maps (bnc#917977).
These non-security issues were fixed:
- Dont pass sloppy option for other than nfs mounts (bnc#901448, bnc#916203)
- Fix insserv warning at postinstall (bnc#913376)
- Fix autofs.service so that multiple options passed through sysconfig AUTOFS_OPTIONS work correctly (bnc#909472)
Patchnames
SUSE-SLE-DESKTOP-12-2015-248,SUSE-SLE-SERVER-12-2015-248
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for autofs", "title": "Title of the patch" }, { "category": "description", "text": "autofs was updated to fix one security issue.\n\nThis security issue was fixed:\n- CVE-2014-8169: Prevent potential privilege escalation via interpreter load path for program-based automount maps (bnc#917977).\n\nThese non-security issues were fixed:\n- Dont pass sloppy option for other than nfs mounts (bnc#901448, bnc#916203)\n- Fix insserv warning at postinstall (bnc#913376)\n- Fix autofs.service so that multiple options passed through sysconfig AUTOFS_OPTIONS work correctly (bnc#909472)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2015-248,SUSE-SLE-SERVER-12-2015-248", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1020-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1020-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151020-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1020-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001428.html" }, { "category": "self", "summary": "SUSE Bug 901448", "url": "https://bugzilla.suse.com/901448" }, { "category": "self", "summary": "SUSE Bug 909472", "url": "https://bugzilla.suse.com/909472" }, { "category": "self", "summary": "SUSE Bug 913376", "url": "https://bugzilla.suse.com/913376" }, { "category": "self", "summary": "SUSE Bug 916203", "url": "https://bugzilla.suse.com/916203" }, { "category": "self", "summary": "SUSE Bug 917977", "url": "https://bugzilla.suse.com/917977" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8169 page", "url": "https://www.suse.com/security/cve/CVE-2014-8169/" } ], "title": "Security update for autofs", "tracking": { "current_release_date": "2015-03-02T14:50:54Z", "generator": { "date": "2015-03-02T14:50:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1020-1", "initial_release_date": "2015-03-02T14:50:54Z", "revision_history": [ { "date": "2015-03-02T14:50:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "autofs-5.0.9-8.1.ppc64le", "product": { "name": "autofs-5.0.9-8.1.ppc64le", "product_id": "autofs-5.0.9-8.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "autofs-5.0.9-8.1.s390x", "product": { "name": "autofs-5.0.9-8.1.s390x", "product_id": "autofs-5.0.9-8.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "autofs-5.0.9-8.1.x86_64", "product": { "name": "autofs-5.0.9-8.1.x86_64", "product_id": "autofs-5.0.9-8.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "autofs-5.0.9-8.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:autofs-5.0.9-8.1.x86_64" }, "product_reference": "autofs-5.0.9-8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-5.0.9-8.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:autofs-5.0.9-8.1.ppc64le" }, "product_reference": "autofs-5.0.9-8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-5.0.9-8.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:autofs-5.0.9-8.1.s390x" }, "product_reference": "autofs-5.0.9-8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-5.0.9-8.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:autofs-5.0.9-8.1.x86_64" }, "product_reference": "autofs-5.0.9-8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-5.0.9-8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:autofs-5.0.9-8.1.ppc64le" }, "product_reference": "autofs-5.0.9-8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-5.0.9-8.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:autofs-5.0.9-8.1.s390x" }, "product_reference": "autofs-5.0.9-8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-5.0.9-8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:autofs-5.0.9-8.1.x86_64" }, "product_reference": "autofs-5.0.9-8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-8169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8169" } ], "notes": [ { "category": "general", "text": "automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user\u0027s USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:autofs-5.0.9-8.1.x86_64", "SUSE Linux Enterprise Server 12:autofs-5.0.9-8.1.ppc64le", "SUSE Linux Enterprise Server 12:autofs-5.0.9-8.1.s390x", "SUSE Linux Enterprise Server 12:autofs-5.0.9-8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:autofs-5.0.9-8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:autofs-5.0.9-8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:autofs-5.0.9-8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8169", "url": "https://www.suse.com/security/cve/CVE-2014-8169" }, { "category": "external", "summary": "SUSE Bug 917977 for CVE-2014-8169", "url": "https://bugzilla.suse.com/917977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:autofs-5.0.9-8.1.x86_64", "SUSE Linux Enterprise Server 12:autofs-5.0.9-8.1.ppc64le", "SUSE Linux Enterprise Server 12:autofs-5.0.9-8.1.s390x", "SUSE Linux Enterprise Server 12:autofs-5.0.9-8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:autofs-5.0.9-8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:autofs-5.0.9-8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:autofs-5.0.9-8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-03-02T14:50:54Z", "details": "moderate" } ], "title": "CVE-2014-8169" } ] }
rhsa-2015:1344
Vulnerability from csaf_redhat
Published
2015-07-20 13:59
Modified
2024-11-22 08:54
Summary
Red Hat Security Advisory: autofs security and bug fix update
Notes
Topic
Updated autofs packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
The autofs utility controls the operation of the automount daemon. The
daemon automatically mounts file systems when in use and unmounts them when
they are not busy.
It was found that program-based automounter maps that used interpreted
languages such as Python would use standard environment variables to locate
and load modules of those languages. A local attacker could potentially use
this flaw to escalate their privileges on the system. (CVE-2014-8169)
Note: This issue has been fixed by adding the "AUTOFS_" prefix to the
affected environment variables so that they are not used to subvert the
system. A configuration option ("force_standard_program_map_env") to
override this prefix and to use the environment variables without the
prefix has been added. In addition, warnings have been added to the manual
page and to the installed configuration file. Now, by default the standard
variables of the program map are provided only with the prefix added to
its name.
Red Hat would like to thank the Georgia Institute of Technology for
reporting this issue.
Bug fixes:
* If the "ls *" command was executed before a valid mount, the autofs
program failed on further mount attempts inside the mount point, whether
the mount point was valid or not. While attempting to mount, the "ls *"
command of the root directory of an indirect mount was executed, which
led to an attempt to mount "*", causing it to be added to the negative
map entry cache. This bug has been fixed by checking for and not adding
"*" while updating the negative map entry cache. (BZ#1163957)
* The autofs program by design did not mount host map entries that were
duplicate exports in an NFS server export list. The duplicate entries in a
multi-mount map entry were recognized as a syntax error and autofs refused
to perform mounts when the duplicate entries occurred. Now, autofs has been
changed to continue mounting the last seen instance of the duplicate entry
rather than fail, and to report the problem in the log files to alert the
system administrator. (BZ#1124083)
* The autofs program did not recognize the yp map type in the master map.
This was caused by another change in the master map parser to fix a problem
with detecting the map format associated with mapping the type in the
master map. The change led to an incorrect length for the type comparison
of yp maps that resulted in a match operation failure. This bug has been
fixed by correcting the length which is used for the comparison.
(BZ#1153130)
* The autofs program did not update the export list of the Sun-format maps
of the network shares exported from an NFS server. This happened due to a
change of the Sun-format map parser leading to the hosts map update to stop
working on the map re-read operation. The bug has been now fixed by
selectively preventing this type of update only for the Sun-formatted maps.
The updates of the export list on the Sun-format maps are now visible and
refreshing of the export list is no longer supported for the Sun-formatted
hosts map. (BZ#1156387)
* Within changes made for adding of the Sun-format maps, an incorrect check
was added that caused a segmentation fault in the Sun-format map parser in
certain circumstances. This has been now fixed by analyzing the intent of
the incorrect check and changing it in order to properly identify the
conditions without causing a fault. (BZ#1175671)
* A bug in the autofs program map lookup module caused an incorrect map
format type comparison. The incorrect comparison affected the Sun-format
program maps where it led to the unused macro definitions. The bug in the
comparison has been fixed so that the macro definitions are not present for
the Sun-format program maps. (BZ#1201195)
Users of autofs are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated autofs packages that fix one security issue and several bugs are\nnow available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The autofs utility controls the operation of the automount daemon. The \ndaemon automatically mounts file systems when in use and unmounts them when \nthey are not busy.\n\nIt was found that program-based automounter maps that used interpreted\nlanguages such as Python would use standard environment variables to locate\nand load modules of those languages. A local attacker could potentially use\nthis flaw to escalate their privileges on the system. (CVE-2014-8169)\n\nNote: This issue has been fixed by adding the \"AUTOFS_\" prefix to the\naffected environment variables so that they are not used to subvert the\nsystem. A configuration option (\"force_standard_program_map_env\") to\noverride this prefix and to use the environment variables without the\nprefix has been added. In addition, warnings have been added to the manual\npage and to the installed configuration file. Now, by default the standard\nvariables of the program map are provided only with the prefix added to\nits name.\n\nRed Hat would like to thank the Georgia Institute of Technology for\nreporting this issue.\n\nBug fixes:\n\n* If the \"ls *\" command was executed before a valid mount, the autofs\nprogram failed on further mount attempts inside the mount point, whether\nthe mount point was valid or not. While attempting to mount, the \"ls *\"\ncommand of the root directory of an indirect mount was executed, which\nled to an attempt to mount \"*\", causing it to be added to the negative\nmap entry cache. This bug has been fixed by checking for and not adding\n\"*\" while updating the negative map entry cache. (BZ#1163957)\n\n* The autofs program by design did not mount host map entries that were\nduplicate exports in an NFS server export list. The duplicate entries in a\nmulti-mount map entry were recognized as a syntax error and autofs refused\nto perform mounts when the duplicate entries occurred. Now, autofs has been\nchanged to continue mounting the last seen instance of the duplicate entry\nrather than fail, and to report the problem in the log files to alert the\nsystem administrator. (BZ#1124083)\n\n* The autofs program did not recognize the yp map type in the master map.\nThis was caused by another change in the master map parser to fix a problem\nwith detecting the map format associated with mapping the type in the\nmaster map. The change led to an incorrect length for the type comparison\nof yp maps that resulted in a match operation failure. This bug has been\nfixed by correcting the length which is used for the comparison.\n(BZ#1153130)\n\n* The autofs program did not update the export list of the Sun-format maps\nof the network shares exported from an NFS server. This happened due to a\nchange of the Sun-format map parser leading to the hosts map update to stop\nworking on the map re-read operation. The bug has been now fixed by\nselectively preventing this type of update only for the Sun-formatted maps.\nThe updates of the export list on the Sun-format maps are now visible and\nrefreshing of the export list is no longer supported for the Sun-formatted\nhosts map. (BZ#1156387)\n\n* Within changes made for adding of the Sun-format maps, an incorrect check \nwas added that caused a segmentation fault in the Sun-format map parser in \ncertain circumstances. This has been now fixed by analyzing the intent of \nthe incorrect check and changing it in order to properly identify the \nconditions without causing a fault. (BZ#1175671)\n\n* A bug in the autofs program map lookup module caused an incorrect map\nformat type comparison. The incorrect comparison affected the Sun-format\nprogram maps where it led to the unused macro definitions. The bug in the\ncomparison has been fixed so that the macro definitions are not present for\nthe Sun-format program maps. (BZ#1201195)\n\nUsers of autofs are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1344", "url": "https://access.redhat.com/errata/RHSA-2015:1344" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1153130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1153130" }, { "category": "external", "summary": "1163957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163957" }, { "category": "external", "summary": "1175671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175671" }, { "category": "external", "summary": "1192565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192565" }, { "category": "external", "summary": "1201195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201195" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1344.json" } ], "title": "Red Hat Security Advisory: autofs security and bug fix update", "tracking": { "current_release_date": "2024-11-22T08:54:48+00:00", "generator": { "date": "2024-11-22T08:54:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1344", "initial_release_date": "2015-07-20T13:59:56+00:00", "revision_history": [ { "date": "2015-07-20T13:59:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-07-20T13:59:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:54:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "autofs-debuginfo-1:5.0.5-113.el6.s390x", "product": { "name": "autofs-debuginfo-1:5.0.5-113.el6.s390x", "product_id": "autofs-debuginfo-1:5.0.5-113.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs-debuginfo@5.0.5-113.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "autofs-1:5.0.5-113.el6.s390x", "product": { "name": "autofs-1:5.0.5-113.el6.s390x", "product_id": "autofs-1:5.0.5-113.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs@5.0.5-113.el6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "autofs-debuginfo-1:5.0.5-113.el6.ppc64", "product": { "name": "autofs-debuginfo-1:5.0.5-113.el6.ppc64", "product_id": "autofs-debuginfo-1:5.0.5-113.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs-debuginfo@5.0.5-113.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "autofs-1:5.0.5-113.el6.ppc64", "product": { "name": "autofs-1:5.0.5-113.el6.ppc64", "product_id": "autofs-1:5.0.5-113.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs@5.0.5-113.el6?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "autofs-debuginfo-1:5.0.5-113.el6.x86_64", "product": { "name": "autofs-debuginfo-1:5.0.5-113.el6.x86_64", "product_id": "autofs-debuginfo-1:5.0.5-113.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs-debuginfo@5.0.5-113.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "autofs-1:5.0.5-113.el6.x86_64", "product": { "name": "autofs-1:5.0.5-113.el6.x86_64", "product_id": "autofs-1:5.0.5-113.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs@5.0.5-113.el6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "autofs-debuginfo-1:5.0.5-113.el6.i686", "product": { "name": "autofs-debuginfo-1:5.0.5-113.el6.i686", "product_id": "autofs-debuginfo-1:5.0.5-113.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs-debuginfo@5.0.5-113.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "autofs-1:5.0.5-113.el6.i686", "product": { "name": "autofs-1:5.0.5-113.el6.i686", "product_id": "autofs-1:5.0.5-113.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs@5.0.5-113.el6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "autofs-1:5.0.5-113.el6.src", "product": { "name": "autofs-1:5.0.5-113.el6.src", "product_id": "autofs-1:5.0.5-113.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs@5.0.5-113.el6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:autofs-1:5.0.5-113.el6.i686" }, "product_reference": "autofs-1:5.0.5-113.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:autofs-1:5.0.5-113.el6.ppc64" }, "product_reference": "autofs-1:5.0.5-113.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:autofs-1:5.0.5-113.el6.s390x" }, "product_reference": "autofs-1:5.0.5-113.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:autofs-1:5.0.5-113.el6.src" }, "product_reference": "autofs-1:5.0.5-113.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:autofs-1:5.0.5-113.el6.x86_64" }, "product_reference": "autofs-1:5.0.5-113.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:autofs-debuginfo-1:5.0.5-113.el6.i686" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:autofs-debuginfo-1:5.0.5-113.el6.ppc64" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:autofs-debuginfo-1:5.0.5-113.el6.s390x" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:autofs-debuginfo-1:5.0.5-113.el6.x86_64" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:autofs-1:5.0.5-113.el6.i686" }, "product_reference": "autofs-1:5.0.5-113.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:autofs-1:5.0.5-113.el6.ppc64" }, "product_reference": "autofs-1:5.0.5-113.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:autofs-1:5.0.5-113.el6.s390x" }, "product_reference": "autofs-1:5.0.5-113.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:autofs-1:5.0.5-113.el6.src" }, "product_reference": "autofs-1:5.0.5-113.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:autofs-1:5.0.5-113.el6.x86_64" }, "product_reference": "autofs-1:5.0.5-113.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.i686" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.ppc64" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.s390x" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.x86_64" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:autofs-1:5.0.5-113.el6.i686" }, "product_reference": "autofs-1:5.0.5-113.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:autofs-1:5.0.5-113.el6.ppc64" }, "product_reference": "autofs-1:5.0.5-113.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:autofs-1:5.0.5-113.el6.s390x" }, "product_reference": "autofs-1:5.0.5-113.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:autofs-1:5.0.5-113.el6.src" }, "product_reference": "autofs-1:5.0.5-113.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:autofs-1:5.0.5-113.el6.x86_64" }, "product_reference": "autofs-1:5.0.5-113.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:autofs-debuginfo-1:5.0.5-113.el6.i686" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:autofs-debuginfo-1:5.0.5-113.el6.ppc64" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:autofs-debuginfo-1:5.0.5-113.el6.s390x" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:autofs-debuginfo-1:5.0.5-113.el6.x86_64" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:autofs-1:5.0.5-113.el6.i686" }, "product_reference": "autofs-1:5.0.5-113.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:autofs-1:5.0.5-113.el6.ppc64" }, "product_reference": "autofs-1:5.0.5-113.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:autofs-1:5.0.5-113.el6.s390x" }, "product_reference": "autofs-1:5.0.5-113.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:autofs-1:5.0.5-113.el6.src" }, "product_reference": "autofs-1:5.0.5-113.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.5-113.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:autofs-1:5.0.5-113.el6.x86_64" }, "product_reference": "autofs-1:5.0.5-113.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.i686" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.ppc64" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.s390x" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.5-113.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.x86_64" }, "product_reference": "autofs-debuginfo-1:5.0.5-113.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Georgia Institute" ], "organization": "Technology" } ], "cve": "CVE-2014-8169", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "discovery_date": "2014-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1192565" } ], "notes": [ { "category": "description", "text": "It was found that program-based automounter maps that used interpreted languages such as Python would use standard environment variables to locate and load modules of those languages. A local attacker could potentially use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "autofs: priv escalation via interpreter load path for program based automount maps", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of autofs package as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:autofs-1:5.0.5-113.el6.i686", "6Client:autofs-1:5.0.5-113.el6.ppc64", "6Client:autofs-1:5.0.5-113.el6.s390x", "6Client:autofs-1:5.0.5-113.el6.src", "6Client:autofs-1:5.0.5-113.el6.x86_64", "6Client:autofs-debuginfo-1:5.0.5-113.el6.i686", "6Client:autofs-debuginfo-1:5.0.5-113.el6.ppc64", "6Client:autofs-debuginfo-1:5.0.5-113.el6.s390x", "6Client:autofs-debuginfo-1:5.0.5-113.el6.x86_64", "6ComputeNode:autofs-1:5.0.5-113.el6.i686", "6ComputeNode:autofs-1:5.0.5-113.el6.ppc64", "6ComputeNode:autofs-1:5.0.5-113.el6.s390x", "6ComputeNode:autofs-1:5.0.5-113.el6.src", "6ComputeNode:autofs-1:5.0.5-113.el6.x86_64", "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.i686", "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.ppc64", "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.s390x", "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.x86_64", "6Server:autofs-1:5.0.5-113.el6.i686", "6Server:autofs-1:5.0.5-113.el6.ppc64", "6Server:autofs-1:5.0.5-113.el6.s390x", "6Server:autofs-1:5.0.5-113.el6.src", "6Server:autofs-1:5.0.5-113.el6.x86_64", "6Server:autofs-debuginfo-1:5.0.5-113.el6.i686", "6Server:autofs-debuginfo-1:5.0.5-113.el6.ppc64", "6Server:autofs-debuginfo-1:5.0.5-113.el6.s390x", "6Server:autofs-debuginfo-1:5.0.5-113.el6.x86_64", "6Workstation:autofs-1:5.0.5-113.el6.i686", "6Workstation:autofs-1:5.0.5-113.el6.ppc64", "6Workstation:autofs-1:5.0.5-113.el6.s390x", "6Workstation:autofs-1:5.0.5-113.el6.src", "6Workstation:autofs-1:5.0.5-113.el6.x86_64", "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.i686", "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.ppc64", "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.s390x", "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-8169" }, { "category": "external", "summary": "RHBZ#1192565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192565" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-8169", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8169" } ], "release_date": "2015-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-20T13:59:56+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client:autofs-1:5.0.5-113.el6.i686", "6Client:autofs-1:5.0.5-113.el6.ppc64", "6Client:autofs-1:5.0.5-113.el6.s390x", "6Client:autofs-1:5.0.5-113.el6.src", "6Client:autofs-1:5.0.5-113.el6.x86_64", "6Client:autofs-debuginfo-1:5.0.5-113.el6.i686", "6Client:autofs-debuginfo-1:5.0.5-113.el6.ppc64", "6Client:autofs-debuginfo-1:5.0.5-113.el6.s390x", "6Client:autofs-debuginfo-1:5.0.5-113.el6.x86_64", "6ComputeNode:autofs-1:5.0.5-113.el6.i686", "6ComputeNode:autofs-1:5.0.5-113.el6.ppc64", "6ComputeNode:autofs-1:5.0.5-113.el6.s390x", "6ComputeNode:autofs-1:5.0.5-113.el6.src", "6ComputeNode:autofs-1:5.0.5-113.el6.x86_64", "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.i686", "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.ppc64", "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.s390x", "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.x86_64", "6Server:autofs-1:5.0.5-113.el6.i686", "6Server:autofs-1:5.0.5-113.el6.ppc64", "6Server:autofs-1:5.0.5-113.el6.s390x", "6Server:autofs-1:5.0.5-113.el6.src", "6Server:autofs-1:5.0.5-113.el6.x86_64", "6Server:autofs-debuginfo-1:5.0.5-113.el6.i686", "6Server:autofs-debuginfo-1:5.0.5-113.el6.ppc64", "6Server:autofs-debuginfo-1:5.0.5-113.el6.s390x", "6Server:autofs-debuginfo-1:5.0.5-113.el6.x86_64", "6Workstation:autofs-1:5.0.5-113.el6.i686", "6Workstation:autofs-1:5.0.5-113.el6.ppc64", "6Workstation:autofs-1:5.0.5-113.el6.s390x", "6Workstation:autofs-1:5.0.5-113.el6.src", "6Workstation:autofs-1:5.0.5-113.el6.x86_64", "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.i686", "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.ppc64", "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.s390x", "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1344" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client:autofs-1:5.0.5-113.el6.i686", "6Client:autofs-1:5.0.5-113.el6.ppc64", "6Client:autofs-1:5.0.5-113.el6.s390x", "6Client:autofs-1:5.0.5-113.el6.src", "6Client:autofs-1:5.0.5-113.el6.x86_64", "6Client:autofs-debuginfo-1:5.0.5-113.el6.i686", "6Client:autofs-debuginfo-1:5.0.5-113.el6.ppc64", "6Client:autofs-debuginfo-1:5.0.5-113.el6.s390x", "6Client:autofs-debuginfo-1:5.0.5-113.el6.x86_64", "6ComputeNode:autofs-1:5.0.5-113.el6.i686", "6ComputeNode:autofs-1:5.0.5-113.el6.ppc64", "6ComputeNode:autofs-1:5.0.5-113.el6.s390x", "6ComputeNode:autofs-1:5.0.5-113.el6.src", "6ComputeNode:autofs-1:5.0.5-113.el6.x86_64", "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.i686", "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.ppc64", "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.s390x", "6ComputeNode:autofs-debuginfo-1:5.0.5-113.el6.x86_64", "6Server:autofs-1:5.0.5-113.el6.i686", "6Server:autofs-1:5.0.5-113.el6.ppc64", "6Server:autofs-1:5.0.5-113.el6.s390x", "6Server:autofs-1:5.0.5-113.el6.src", "6Server:autofs-1:5.0.5-113.el6.x86_64", "6Server:autofs-debuginfo-1:5.0.5-113.el6.i686", "6Server:autofs-debuginfo-1:5.0.5-113.el6.ppc64", "6Server:autofs-debuginfo-1:5.0.5-113.el6.s390x", "6Server:autofs-debuginfo-1:5.0.5-113.el6.x86_64", "6Workstation:autofs-1:5.0.5-113.el6.i686", "6Workstation:autofs-1:5.0.5-113.el6.ppc64", "6Workstation:autofs-1:5.0.5-113.el6.s390x", "6Workstation:autofs-1:5.0.5-113.el6.src", "6Workstation:autofs-1:5.0.5-113.el6.x86_64", "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.i686", "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.ppc64", "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.s390x", "6Workstation:autofs-debuginfo-1:5.0.5-113.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "autofs: priv escalation via interpreter load path for program based automount maps" } ] }
rhsa-2015:2417
Vulnerability from csaf_redhat
Published
2015-11-19 06:23
Modified
2024-11-22 08:54
Summary
Red Hat Security Advisory: autofs security, bug fix and enhancement update
Notes
Topic
Updated autofs packages that fix one security issue, several bugs, and add
one enhancement are now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
The autofs utility controls the operation of the automount daemon. The
daemon automatically mounts file systems when in use and unmounts them when
they are not busy.
It was found that program-based automounter maps that used interpreted
languages such as Python used standard environment variables to locate
and load modules of those languages. A local attacker could potentially use
this flaw to escalate their privileges on the system. (CVE-2014-8169)
Note: This issue has been fixed by adding the "AUTOFS_" prefix to the
affected environment variables so that they are not used to subvert the
system. A configuration option ("force_standard_program_map_env") to
override this prefix and to use the environment variables without the
prefix has been added. In addition, warnings have been added to the manual
page and to the installed configuration file. Now, by default the standard
variables of the program map are provided only with the prefix added to
its name.
Red Hat would like to thank the Georgia Institute of Technology for
reporting this issue.
Notably, this update fixes the following bugs:
* When the "ls *" command was run in the root of an indirect mount, autofs
attempted to literally mount the wildcard character (*) causing it to be
added to the negative cache. If done before a valid mount, autofs then
failed on further mount attempts inside the mount point, valid or not. This
has been fixed, and wildcard map entries now function in the described
situation. (BZ#1166457)
* When autofs encountered a syntax error consisting of a duplicate entry in
a multimap entry, it reported an error and did not mount the map entry.
With this update, autofs has been amended to report the problem in the log
to alert the system administrator and use the last seen instance of the
duplicate entry rather than fail. (BZ#1205600)
* In the ldap and sss lookup modules, the map reading functions did not
distinguish between the "no entry found" and "service not available"
errors. Consequently, when the "service not available" response was
returned from a master map read, autofs did not update the mounts.
An "entry not found" return does not prevent the map update, so the ldap
and sss lookup modules were updated to distinguish between these two
returns and now work as expected. (BZ#1233065)
In addition, this update adds the following enhancement:
* The description of the configuration parameter map_hash_table_size was
missing from the autofs.conf(5) man page and its description in the
configuration file comments was insufficient. A description of the
parameter has been added to autofs.conf(5), and the configuration file
comments have been updated. (BZ#1238573)
All autofs users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add this
enhancement.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated autofs packages that fix one security issue, several bugs, and add\none enhancement are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The autofs utility controls the operation of the automount daemon. The\ndaemon automatically mounts file systems when in use and unmounts them when\nthey are not busy.\n\nIt was found that program-based automounter maps that used interpreted\nlanguages such as Python used standard environment variables to locate\nand load modules of those languages. A local attacker could potentially use\nthis flaw to escalate their privileges on the system. (CVE-2014-8169)\n\nNote: This issue has been fixed by adding the \"AUTOFS_\" prefix to the\naffected environment variables so that they are not used to subvert the\nsystem. A configuration option (\"force_standard_program_map_env\") to\noverride this prefix and to use the environment variables without the\nprefix has been added. In addition, warnings have been added to the manual\npage and to the installed configuration file. Now, by default the standard\nvariables of the program map are provided only with the prefix added to\nits name.\n\nRed Hat would like to thank the Georgia Institute of Technology for\nreporting this issue.\n\nNotably, this update fixes the following bugs:\n\n* When the \"ls *\" command was run in the root of an indirect mount, autofs\nattempted to literally mount the wildcard character (*) causing it to be\nadded to the negative cache. If done before a valid mount, autofs then\nfailed on further mount attempts inside the mount point, valid or not. This\nhas been fixed, and wildcard map entries now function in the described\nsituation. (BZ#1166457)\n\n* When autofs encountered a syntax error consisting of a duplicate entry in\na multimap entry, it reported an error and did not mount the map entry.\nWith this update, autofs has been amended to report the problem in the log\nto alert the system administrator and use the last seen instance of the\nduplicate entry rather than fail. (BZ#1205600)\n\n* In the ldap and sss lookup modules, the map reading functions did not\ndistinguish between the \"no entry found\" and \"service not available\"\nerrors. Consequently, when the \"service not available\" response was\nreturned from a master map read, autofs did not update the mounts.\nAn \"entry not found\" return does not prevent the map update, so the ldap\nand sss lookup modules were updated to distinguish between these two\nreturns and now work as expected. (BZ#1233065)\n\nIn addition, this update adds the following enhancement:\n\n* The description of the configuration parameter map_hash_table_size was\nmissing from the autofs.conf(5) man page and its description in the\nconfiguration file comments was insufficient. A description of the\nparameter has been added to autofs.conf(5), and the configuration file\ncomments have been updated. (BZ#1238573)\n\nAll autofs users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add this\nenhancement.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2417", "url": "https://access.redhat.com/errata/RHSA-2015:2417" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1161474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161474" }, { "category": "external", "summary": "1166457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166457" }, { "category": "external", "summary": "1192565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192565" }, { "category": "external", "summary": "1201582", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201582" }, { "category": "external", "summary": "1218045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218045" }, { "category": "external", "summary": "1233067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1233067" }, { "category": "external", "summary": "1233069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1233069" }, { "category": "external", "summary": "1263508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1263508" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2417.json" } ], "title": "Red Hat Security Advisory: autofs security, bug fix and enhancement update", "tracking": { "current_release_date": "2024-11-22T08:54:53+00:00", "generator": { "date": "2024-11-22T08:54:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2417", "initial_release_date": "2015-11-19T06:23:21+00:00", "revision_history": [ { "date": "2015-11-19T06:23:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-11-19T06:23:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:54:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "autofs-1:5.0.7-54.el7.x86_64", "product": { "name": "autofs-1:5.0.7-54.el7.x86_64", "product_id": "autofs-1:5.0.7-54.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs@5.0.7-54.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "autofs-debuginfo-1:5.0.7-54.el7.x86_64", "product": { "name": "autofs-debuginfo-1:5.0.7-54.el7.x86_64", "product_id": "autofs-debuginfo-1:5.0.7-54.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs-debuginfo@5.0.7-54.el7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "autofs-1:5.0.7-54.el7.src", "product": { "name": "autofs-1:5.0.7-54.el7.src", "product_id": "autofs-1:5.0.7-54.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs@5.0.7-54.el7?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "autofs-debuginfo-1:5.0.7-54.el7.s390x", "product": { "name": "autofs-debuginfo-1:5.0.7-54.el7.s390x", "product_id": "autofs-debuginfo-1:5.0.7-54.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs-debuginfo@5.0.7-54.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "autofs-1:5.0.7-54.el7.s390x", "product": { "name": "autofs-1:5.0.7-54.el7.s390x", "product_id": "autofs-1:5.0.7-54.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs@5.0.7-54.el7?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "autofs-debuginfo-1:5.0.7-54.el7.ppc64", "product": { "name": "autofs-debuginfo-1:5.0.7-54.el7.ppc64", "product_id": "autofs-debuginfo-1:5.0.7-54.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs-debuginfo@5.0.7-54.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "autofs-1:5.0.7-54.el7.ppc64", "product": { "name": "autofs-1:5.0.7-54.el7.ppc64", "product_id": "autofs-1:5.0.7-54.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs@5.0.7-54.el7?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "autofs-debuginfo-1:5.0.7-54.el7.aarch64", "product": { "name": "autofs-debuginfo-1:5.0.7-54.el7.aarch64", "product_id": "autofs-debuginfo-1:5.0.7-54.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs-debuginfo@5.0.7-54.el7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "autofs-1:5.0.7-54.el7.aarch64", "product": { "name": "autofs-1:5.0.7-54.el7.aarch64", "product_id": "autofs-1:5.0.7-54.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs@5.0.7-54.el7?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "product": { "name": "autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "product_id": "autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs-debuginfo@5.0.7-54.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "autofs-1:5.0.7-54.el7.ppc64le", "product": { "name": "autofs-1:5.0.7-54.el7.ppc64le", "product_id": "autofs-1:5.0.7-54.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/autofs@5.0.7-54.el7?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:autofs-1:5.0.7-54.el7.aarch64" }, "product_reference": "autofs-1:5.0.7-54.el7.aarch64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:autofs-1:5.0.7-54.el7.ppc64" }, "product_reference": "autofs-1:5.0.7-54.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:autofs-1:5.0.7-54.el7.ppc64le" }, "product_reference": "autofs-1:5.0.7-54.el7.ppc64le", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:autofs-1:5.0.7-54.el7.s390x" }, "product_reference": "autofs-1:5.0.7-54.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:autofs-1:5.0.7-54.el7.src" }, "product_reference": "autofs-1:5.0.7-54.el7.src", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:autofs-1:5.0.7-54.el7.x86_64" }, "product_reference": "autofs-1:5.0.7-54.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:autofs-debuginfo-1:5.0.7-54.el7.aarch64" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.aarch64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:autofs-debuginfo-1:5.0.7-54.el7.ppc64" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:autofs-debuginfo-1:5.0.7-54.el7.ppc64le" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:autofs-debuginfo-1:5.0.7-54.el7.s390x" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:autofs-debuginfo-1:5.0.7-54.el7.x86_64" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:autofs-1:5.0.7-54.el7.aarch64" }, "product_reference": "autofs-1:5.0.7-54.el7.aarch64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:autofs-1:5.0.7-54.el7.ppc64" }, "product_reference": "autofs-1:5.0.7-54.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:autofs-1:5.0.7-54.el7.ppc64le" }, "product_reference": "autofs-1:5.0.7-54.el7.ppc64le", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:autofs-1:5.0.7-54.el7.s390x" }, "product_reference": "autofs-1:5.0.7-54.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:autofs-1:5.0.7-54.el7.src" }, "product_reference": "autofs-1:5.0.7-54.el7.src", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:autofs-1:5.0.7-54.el7.x86_64" }, "product_reference": "autofs-1:5.0.7-54.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.aarch64" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.aarch64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.ppc64" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.ppc64le" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.s390x" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.x86_64" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:autofs-1:5.0.7-54.el7.aarch64" }, "product_reference": "autofs-1:5.0.7-54.el7.aarch64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:autofs-1:5.0.7-54.el7.ppc64" }, "product_reference": "autofs-1:5.0.7-54.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:autofs-1:5.0.7-54.el7.ppc64le" }, "product_reference": "autofs-1:5.0.7-54.el7.ppc64le", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:autofs-1:5.0.7-54.el7.s390x" }, "product_reference": "autofs-1:5.0.7-54.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:autofs-1:5.0.7-54.el7.src" }, "product_reference": "autofs-1:5.0.7-54.el7.src", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:autofs-1:5.0.7-54.el7.x86_64" }, "product_reference": "autofs-1:5.0.7-54.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:autofs-debuginfo-1:5.0.7-54.el7.aarch64" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.aarch64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:autofs-debuginfo-1:5.0.7-54.el7.ppc64" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:autofs-debuginfo-1:5.0.7-54.el7.ppc64le" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:autofs-debuginfo-1:5.0.7-54.el7.s390x" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:autofs-debuginfo-1:5.0.7-54.el7.x86_64" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:autofs-1:5.0.7-54.el7.aarch64" }, "product_reference": "autofs-1:5.0.7-54.el7.aarch64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:autofs-1:5.0.7-54.el7.ppc64" }, "product_reference": "autofs-1:5.0.7-54.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:autofs-1:5.0.7-54.el7.ppc64le" }, "product_reference": "autofs-1:5.0.7-54.el7.ppc64le", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:autofs-1:5.0.7-54.el7.s390x" }, "product_reference": "autofs-1:5.0.7-54.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:autofs-1:5.0.7-54.el7.src" }, "product_reference": "autofs-1:5.0.7-54.el7.src", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-1:5.0.7-54.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:autofs-1:5.0.7-54.el7.x86_64" }, "product_reference": "autofs-1:5.0.7-54.el7.x86_64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.aarch64" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.aarch64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.ppc64" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.ppc64le" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.s390x" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-debuginfo-1:5.0.7-54.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.x86_64" }, "product_reference": "autofs-debuginfo-1:5.0.7-54.el7.x86_64", "relates_to_product_reference": "7Workstation" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Georgia Institute" ], "organization": "Technology" } ], "cve": "CVE-2014-8169", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "discovery_date": "2014-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1192565" } ], "notes": [ { "category": "description", "text": "It was found that program-based automounter maps that used interpreted languages such as Python would use standard environment variables to locate and load modules of those languages. A local attacker could potentially use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "autofs: priv escalation via interpreter load path for program based automount maps", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of autofs package as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client:autofs-1:5.0.7-54.el7.aarch64", "7Client:autofs-1:5.0.7-54.el7.ppc64", "7Client:autofs-1:5.0.7-54.el7.ppc64le", "7Client:autofs-1:5.0.7-54.el7.s390x", "7Client:autofs-1:5.0.7-54.el7.src", "7Client:autofs-1:5.0.7-54.el7.x86_64", "7Client:autofs-debuginfo-1:5.0.7-54.el7.aarch64", "7Client:autofs-debuginfo-1:5.0.7-54.el7.ppc64", "7Client:autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "7Client:autofs-debuginfo-1:5.0.7-54.el7.s390x", "7Client:autofs-debuginfo-1:5.0.7-54.el7.x86_64", "7ComputeNode:autofs-1:5.0.7-54.el7.aarch64", "7ComputeNode:autofs-1:5.0.7-54.el7.ppc64", "7ComputeNode:autofs-1:5.0.7-54.el7.ppc64le", "7ComputeNode:autofs-1:5.0.7-54.el7.s390x", "7ComputeNode:autofs-1:5.0.7-54.el7.src", "7ComputeNode:autofs-1:5.0.7-54.el7.x86_64", "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.aarch64", "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.ppc64", "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.s390x", "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.x86_64", "7Server:autofs-1:5.0.7-54.el7.aarch64", "7Server:autofs-1:5.0.7-54.el7.ppc64", "7Server:autofs-1:5.0.7-54.el7.ppc64le", "7Server:autofs-1:5.0.7-54.el7.s390x", "7Server:autofs-1:5.0.7-54.el7.src", "7Server:autofs-1:5.0.7-54.el7.x86_64", "7Server:autofs-debuginfo-1:5.0.7-54.el7.aarch64", "7Server:autofs-debuginfo-1:5.0.7-54.el7.ppc64", "7Server:autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "7Server:autofs-debuginfo-1:5.0.7-54.el7.s390x", "7Server:autofs-debuginfo-1:5.0.7-54.el7.x86_64", "7Workstation:autofs-1:5.0.7-54.el7.aarch64", "7Workstation:autofs-1:5.0.7-54.el7.ppc64", "7Workstation:autofs-1:5.0.7-54.el7.ppc64le", "7Workstation:autofs-1:5.0.7-54.el7.s390x", "7Workstation:autofs-1:5.0.7-54.el7.src", "7Workstation:autofs-1:5.0.7-54.el7.x86_64", "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.aarch64", "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.ppc64", "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.s390x", "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-8169" }, { "category": "external", "summary": "RHBZ#1192565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192565" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-8169", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8169" } ], "release_date": "2015-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-19T06:23:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client:autofs-1:5.0.7-54.el7.aarch64", "7Client:autofs-1:5.0.7-54.el7.ppc64", "7Client:autofs-1:5.0.7-54.el7.ppc64le", "7Client:autofs-1:5.0.7-54.el7.s390x", "7Client:autofs-1:5.0.7-54.el7.src", "7Client:autofs-1:5.0.7-54.el7.x86_64", "7Client:autofs-debuginfo-1:5.0.7-54.el7.aarch64", "7Client:autofs-debuginfo-1:5.0.7-54.el7.ppc64", "7Client:autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "7Client:autofs-debuginfo-1:5.0.7-54.el7.s390x", "7Client:autofs-debuginfo-1:5.0.7-54.el7.x86_64", "7ComputeNode:autofs-1:5.0.7-54.el7.aarch64", "7ComputeNode:autofs-1:5.0.7-54.el7.ppc64", "7ComputeNode:autofs-1:5.0.7-54.el7.ppc64le", "7ComputeNode:autofs-1:5.0.7-54.el7.s390x", "7ComputeNode:autofs-1:5.0.7-54.el7.src", "7ComputeNode:autofs-1:5.0.7-54.el7.x86_64", "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.aarch64", "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.ppc64", "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.s390x", "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.x86_64", "7Server:autofs-1:5.0.7-54.el7.aarch64", "7Server:autofs-1:5.0.7-54.el7.ppc64", "7Server:autofs-1:5.0.7-54.el7.ppc64le", "7Server:autofs-1:5.0.7-54.el7.s390x", "7Server:autofs-1:5.0.7-54.el7.src", "7Server:autofs-1:5.0.7-54.el7.x86_64", "7Server:autofs-debuginfo-1:5.0.7-54.el7.aarch64", "7Server:autofs-debuginfo-1:5.0.7-54.el7.ppc64", "7Server:autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "7Server:autofs-debuginfo-1:5.0.7-54.el7.s390x", "7Server:autofs-debuginfo-1:5.0.7-54.el7.x86_64", "7Workstation:autofs-1:5.0.7-54.el7.aarch64", "7Workstation:autofs-1:5.0.7-54.el7.ppc64", "7Workstation:autofs-1:5.0.7-54.el7.ppc64le", "7Workstation:autofs-1:5.0.7-54.el7.s390x", "7Workstation:autofs-1:5.0.7-54.el7.src", "7Workstation:autofs-1:5.0.7-54.el7.x86_64", "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.aarch64", "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.ppc64", "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.s390x", "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2417" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "7Client:autofs-1:5.0.7-54.el7.aarch64", "7Client:autofs-1:5.0.7-54.el7.ppc64", "7Client:autofs-1:5.0.7-54.el7.ppc64le", "7Client:autofs-1:5.0.7-54.el7.s390x", "7Client:autofs-1:5.0.7-54.el7.src", "7Client:autofs-1:5.0.7-54.el7.x86_64", "7Client:autofs-debuginfo-1:5.0.7-54.el7.aarch64", "7Client:autofs-debuginfo-1:5.0.7-54.el7.ppc64", "7Client:autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "7Client:autofs-debuginfo-1:5.0.7-54.el7.s390x", "7Client:autofs-debuginfo-1:5.0.7-54.el7.x86_64", "7ComputeNode:autofs-1:5.0.7-54.el7.aarch64", "7ComputeNode:autofs-1:5.0.7-54.el7.ppc64", "7ComputeNode:autofs-1:5.0.7-54.el7.ppc64le", "7ComputeNode:autofs-1:5.0.7-54.el7.s390x", "7ComputeNode:autofs-1:5.0.7-54.el7.src", "7ComputeNode:autofs-1:5.0.7-54.el7.x86_64", "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.aarch64", "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.ppc64", "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.s390x", "7ComputeNode:autofs-debuginfo-1:5.0.7-54.el7.x86_64", "7Server:autofs-1:5.0.7-54.el7.aarch64", "7Server:autofs-1:5.0.7-54.el7.ppc64", "7Server:autofs-1:5.0.7-54.el7.ppc64le", "7Server:autofs-1:5.0.7-54.el7.s390x", "7Server:autofs-1:5.0.7-54.el7.src", "7Server:autofs-1:5.0.7-54.el7.x86_64", "7Server:autofs-debuginfo-1:5.0.7-54.el7.aarch64", "7Server:autofs-debuginfo-1:5.0.7-54.el7.ppc64", "7Server:autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "7Server:autofs-debuginfo-1:5.0.7-54.el7.s390x", "7Server:autofs-debuginfo-1:5.0.7-54.el7.x86_64", "7Workstation:autofs-1:5.0.7-54.el7.aarch64", "7Workstation:autofs-1:5.0.7-54.el7.ppc64", "7Workstation:autofs-1:5.0.7-54.el7.ppc64le", "7Workstation:autofs-1:5.0.7-54.el7.s390x", "7Workstation:autofs-1:5.0.7-54.el7.src", "7Workstation:autofs-1:5.0.7-54.el7.x86_64", "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.aarch64", "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.ppc64", "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.ppc64le", "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.s390x", "7Workstation:autofs-debuginfo-1:5.0.7-54.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "autofs: priv escalation via interpreter load path for program based automount maps" } ] }
opensuse-su-2024:10319-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
autofs-5.1.1-3.5 on GA media
Notes
Title of the patch
autofs-5.1.1-3.5 on GA media
Description of the patch
These are all security issues fixed in the autofs-5.1.1-3.5 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10319
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "autofs-5.1.1-3.5 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the autofs-5.1.1-3.5 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10319", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10319-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8169 page", "url": "https://www.suse.com/security/cve/CVE-2014-8169/" } ], "title": "autofs-5.1.1-3.5 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10319-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "autofs-5.1.1-3.5.aarch64", "product": { "name": "autofs-5.1.1-3.5.aarch64", "product_id": "autofs-5.1.1-3.5.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "autofs-5.1.1-3.5.ppc64le", "product": { "name": "autofs-5.1.1-3.5.ppc64le", "product_id": "autofs-5.1.1-3.5.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "autofs-5.1.1-3.5.s390x", "product": { "name": "autofs-5.1.1-3.5.s390x", "product_id": "autofs-5.1.1-3.5.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "autofs-5.1.1-3.5.x86_64", "product": { "name": "autofs-5.1.1-3.5.x86_64", "product_id": "autofs-5.1.1-3.5.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "autofs-5.1.1-3.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:autofs-5.1.1-3.5.aarch64" }, "product_reference": "autofs-5.1.1-3.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-5.1.1-3.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:autofs-5.1.1-3.5.ppc64le" }, "product_reference": "autofs-5.1.1-3.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-5.1.1-3.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:autofs-5.1.1-3.5.s390x" }, "product_reference": "autofs-5.1.1-3.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "autofs-5.1.1-3.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:autofs-5.1.1-3.5.x86_64" }, "product_reference": "autofs-5.1.1-3.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-8169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8169" } ], "notes": [ { "category": "general", "text": "automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user\u0027s USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:autofs-5.1.1-3.5.aarch64", "openSUSE Tumbleweed:autofs-5.1.1-3.5.ppc64le", "openSUSE Tumbleweed:autofs-5.1.1-3.5.s390x", "openSUSE Tumbleweed:autofs-5.1.1-3.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8169", "url": "https://www.suse.com/security/cve/CVE-2014-8169" }, { "category": "external", "summary": "SUSE Bug 917977 for CVE-2014-8169", "url": "https://bugzilla.suse.com/917977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:autofs-5.1.1-3.5.aarch64", "openSUSE Tumbleweed:autofs-5.1.1-3.5.ppc64le", "openSUSE Tumbleweed:autofs-5.1.1-3.5.s390x", "openSUSE Tumbleweed:autofs-5.1.1-3.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-8169" } ] }
ghsa-q56m-rhvg-jwg2
Vulnerability from github
Published
2022-05-14 02:05
Modified
2022-05-14 02:05
VLAI Severity ?
Details
automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.
{ "affected": [], "aliases": [ "CVE-2014-8169" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-03-18T16:59:00Z", "severity": "MODERATE" }, "details": "automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user\u0027s USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.", "id": "GHSA-q56m-rhvg-jwg2", "modified": "2022-05-14T02:05:34Z", "published": "2022-05-14T02:05:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8169" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2015:1344" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2015:2417" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2014-8169" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192565" }, { "type": "WEB", "url": "https://bugzilla.suse.com/show_bug.cgi?id=917977" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1344.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/73211" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2579-1" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…