Ubuntu alert USN-2579-1 (autofs)
| From: | Marc Deslauriers <marc.deslauriers@canonical.com> | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-2579-1] autofs vulnerability | |
| Date: | Mon, 27 Apr 2015 08:59:49 -0400 | |
| Message-ID: | <553E32C5.5050703@canonical.com> |
========================================================================== Ubuntu Security Notice USN-2579-1 April 27, 2015 autofs vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.10 Summary: autofs could be made to run programs as an administrator if program maps were configured. Software Description: - autofs: kernel-based automounter for Linux Details: It was discovered that autofs incorrectly filtered environment variables when using program maps. When program maps were configured, a local user could use this issue to escalate privileges. This update changes the default behaviour by adding a prefix to environment variables. Sites using program maps will need to adapt to the new variable names, or revert to the previous names by using a new configuration option called FORCE_STANDARD_PROGRAM_MAP_ENV. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.10: autofs 5.0.8-1ubuntu1.1 After a standard system update you need to reboot your computer to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2579-1 CVE-2014-8169 Package Information: https://launchpad.net/ubuntu/+source/autofs/5.0.8-1ubuntu1.1 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...
