|
|
Log in / Subscribe / Register

Ubuntu alert USN-2579-1 (autofs)

From:  Marc Deslauriers <marc.deslauriers@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-2579-1] autofs vulnerability
Date:  Mon, 27 Apr 2015 08:59:49 -0400
Message-ID:  <553E32C5.5050703@canonical.com>

========================================================================== Ubuntu Security Notice USN-2579-1 April 27, 2015 autofs vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.10 Summary: autofs could be made to run programs as an administrator if program maps were configured. Software Description: - autofs: kernel-based automounter for Linux Details: It was discovered that autofs incorrectly filtered environment variables when using program maps. When program maps were configured, a local user could use this issue to escalate privileges. This update changes the default behaviour by adding a prefix to environment variables. Sites using program maps will need to adapt to the new variable names, or revert to the previous names by using a new configuration option called FORCE_STANDARD_PROGRAM_MAP_ENV. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.10: autofs 5.0.8-1ubuntu1.1 After a standard system update you need to reboot your computer to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2579-1 CVE-2014-8169 Package Information: https://launchpad.net/ubuntu/+source/autofs/5.0.8-1ubuntu1.1 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds