Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2015:1344 - Security Advisory
Issued:
2015-07-22
Updated:
2015-07-22

RHSA-2015:1344 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: autofs security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated autofs packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

The autofs utility controls the operation of the automount daemon. The
daemon automatically mounts file systems when in use and unmounts them when
they are not busy.

It was found that program-based automounter maps that used interpreted
languages such as Python would use standard environment variables to locate
and load modules of those languages. A local attacker could potentially use
this flaw to escalate their privileges on the system. (CVE-2014-8169)

Note: This issue has been fixed by adding the "AUTOFS_" prefix to the
affected environment variables so that they are not used to subvert the
system. A configuration option ("force_standard_program_map_env") to
override this prefix and to use the environment variables without the
prefix has been added. In addition, warnings have been added to the manual
page and to the installed configuration file. Now, by default the standard
variables of the program map are provided only with the prefix added to
its name.

Red Hat would like to thank the Georgia Institute of Technology for
reporting this issue.

Bug fixes:

  • If the "ls *" command was executed before a valid mount, the autofs

program failed on further mount attempts inside the mount point, whether
the mount point was valid or not. While attempting to mount, the "ls *"
command of the root directory of an indirect mount was executed, which
led to an attempt to mount "*", causing it to be added to the negative
map entry cache. This bug has been fixed by checking for and not adding
"*" while updating the negative map entry cache. (BZ#1163957)

  • The autofs program by design did not mount host map entries that were

duplicate exports in an NFS server export list. The duplicate entries in a
multi-mount map entry were recognized as a syntax error and autofs refused
to perform mounts when the duplicate entries occurred. Now, autofs has been
changed to continue mounting the last seen instance of the duplicate entry
rather than fail, and to report the problem in the log files to alert the
system administrator. (BZ#1124083)

  • The autofs program did not recognize the yp map type in the master map.

This was caused by another change in the master map parser to fix a problem
with detecting the map format associated with mapping the type in the
master map. The change led to an incorrect length for the type comparison
of yp maps that resulted in a match operation failure. This bug has been
fixed by correcting the length which is used for the comparison.
(BZ#1153130)

  • The autofs program did not update the export list of the Sun-format maps

of the network shares exported from an NFS server. This happened due to a
change of the Sun-format map parser leading to the hosts map update to stop
working on the map re-read operation. The bug has been now fixed by
selectively preventing this type of update only for the Sun-formatted maps.
The updates of the export list on the Sun-format maps are now visible and
refreshing of the export list is no longer supported for the Sun-formatted
hosts map. (BZ#1156387)

  • Within changes made for adding of the Sun-format maps, an incorrect check

was added that caused a segmentation fault in the Sun-format map parser in
certain circumstances. This has been now fixed by analyzing the intent of
the incorrect check and changing it in order to properly identify the
conditions without causing a fault. (BZ#1175671)

  • A bug in the autofs program map lookup module caused an incorrect map

format type comparison. The incorrect comparison affected the Sun-format
program maps where it led to the unused macro definitions. The bug in the
comparison has been fixed so that the macro definitions are not present for
the Sun-format program maps. (BZ#1201195)

Users of autofs are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x

Fixes

  • BZ - 1153130 - autofs-5.0.5-109 with upgrade to RHEL 6.6 no longer recognizes +yp: in auto.master
  • BZ - 1163957 - Autofs unable to mount indirect after attempt to mount wildcard
  • BZ - 1175671 - automount segment fault in parse_sun.so for negative parser tests
  • BZ - 1192565 - CVE-2014-8169 autofs: priv escalation via interpreter load path for program based automount maps
  • BZ - 1201195 - autofs: MAPFMT_DEFAULT is not macro in lookup_program.c

CVEs

  • CVE-2014-8169

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
autofs-5.0.5-113.el6.src.rpm SHA-256: a3bc5d078e77245e9bc5ce7559ad44b78e33acd739bfdc670d190cae1020472b
x86_64
autofs-5.0.5-113.el6.x86_64.rpm SHA-256: c0dd0d07a35a8ad67d230b7fbb5f8f5bb9799c2470e2bb1c635888e170814861
autofs-debuginfo-5.0.5-113.el6.x86_64.rpm SHA-256: c6b1f7be274a3b0586ed0acdc75966e42ec89398c91583fac2b7f264448cfe9a
i386
autofs-5.0.5-113.el6.i686.rpm SHA-256: 2fc0cb31216b4d6818bb7845ac3c213b9a729ed46a2b3b1861f0f25bdcbfa31e
autofs-debuginfo-5.0.5-113.el6.i686.rpm SHA-256: 03ac3c8d3b7a7d19f2a4656033db70379ec0e82f0ebedbe72dbf6c5e463df679

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
autofs-5.0.5-113.el6.src.rpm SHA-256: a3bc5d078e77245e9bc5ce7559ad44b78e33acd739bfdc670d190cae1020472b
x86_64
autofs-5.0.5-113.el6.x86_64.rpm SHA-256: c0dd0d07a35a8ad67d230b7fbb5f8f5bb9799c2470e2bb1c635888e170814861
autofs-debuginfo-5.0.5-113.el6.x86_64.rpm SHA-256: c6b1f7be274a3b0586ed0acdc75966e42ec89398c91583fac2b7f264448cfe9a
i386
autofs-5.0.5-113.el6.i686.rpm SHA-256: 2fc0cb31216b4d6818bb7845ac3c213b9a729ed46a2b3b1861f0f25bdcbfa31e
autofs-debuginfo-5.0.5-113.el6.i686.rpm SHA-256: 03ac3c8d3b7a7d19f2a4656033db70379ec0e82f0ebedbe72dbf6c5e463df679

Red Hat Enterprise Linux Workstation 6

SRPM
autofs-5.0.5-113.el6.src.rpm SHA-256: a3bc5d078e77245e9bc5ce7559ad44b78e33acd739bfdc670d190cae1020472b
x86_64
autofs-5.0.5-113.el6.x86_64.rpm SHA-256: c0dd0d07a35a8ad67d230b7fbb5f8f5bb9799c2470e2bb1c635888e170814861
autofs-debuginfo-5.0.5-113.el6.x86_64.rpm SHA-256: c6b1f7be274a3b0586ed0acdc75966e42ec89398c91583fac2b7f264448cfe9a
i386
autofs-5.0.5-113.el6.i686.rpm SHA-256: 2fc0cb31216b4d6818bb7845ac3c213b9a729ed46a2b3b1861f0f25bdcbfa31e
autofs-debuginfo-5.0.5-113.el6.i686.rpm SHA-256: 03ac3c8d3b7a7d19f2a4656033db70379ec0e82f0ebedbe72dbf6c5e463df679

Red Hat Enterprise Linux Desktop 6

SRPM
autofs-5.0.5-113.el6.src.rpm SHA-256: a3bc5d078e77245e9bc5ce7559ad44b78e33acd739bfdc670d190cae1020472b
x86_64
autofs-5.0.5-113.el6.x86_64.rpm SHA-256: c0dd0d07a35a8ad67d230b7fbb5f8f5bb9799c2470e2bb1c635888e170814861
autofs-debuginfo-5.0.5-113.el6.x86_64.rpm SHA-256: c6b1f7be274a3b0586ed0acdc75966e42ec89398c91583fac2b7f264448cfe9a
i386
autofs-5.0.5-113.el6.i686.rpm SHA-256: 2fc0cb31216b4d6818bb7845ac3c213b9a729ed46a2b3b1861f0f25bdcbfa31e
autofs-debuginfo-5.0.5-113.el6.i686.rpm SHA-256: 03ac3c8d3b7a7d19f2a4656033db70379ec0e82f0ebedbe72dbf6c5e463df679

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
autofs-5.0.5-113.el6.src.rpm SHA-256: a3bc5d078e77245e9bc5ce7559ad44b78e33acd739bfdc670d190cae1020472b
s390x
autofs-5.0.5-113.el6.s390x.rpm SHA-256: d224f3c8fc68a81eae8b5f9972c4b5d756ec31b9ae6bf81c2a923f31792dd7ab
autofs-debuginfo-5.0.5-113.el6.s390x.rpm SHA-256: 23aeecf582c15ee544d08ea4beaee5e480a87d427bb91bd2e4ef1b8f7ec2704d

Red Hat Enterprise Linux for Power, big endian 6

SRPM
autofs-5.0.5-113.el6.src.rpm SHA-256: a3bc5d078e77245e9bc5ce7559ad44b78e33acd739bfdc670d190cae1020472b
ppc64
autofs-5.0.5-113.el6.ppc64.rpm SHA-256: 099e0ef89b9c1e54fb1bc1e21ee59e4624a8c424b626b950fd6c050136f44ec4
autofs-debuginfo-5.0.5-113.el6.ppc64.rpm SHA-256: e6bc2aea45e98b02b0231c5ac653c2eafed550cef270620accb642d1a9ba5cc4

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
autofs-5.0.5-113.el6.src.rpm SHA-256: a3bc5d078e77245e9bc5ce7559ad44b78e33acd739bfdc670d190cae1020472b
x86_64
autofs-5.0.5-113.el6.x86_64.rpm SHA-256: c0dd0d07a35a8ad67d230b7fbb5f8f5bb9799c2470e2bb1c635888e170814861
autofs-debuginfo-5.0.5-113.el6.x86_64.rpm SHA-256: c6b1f7be274a3b0586ed0acdc75966e42ec89398c91583fac2b7f264448cfe9a

Red Hat Enterprise Linux Server from RHUI 6

SRPM
autofs-5.0.5-113.el6.src.rpm SHA-256: a3bc5d078e77245e9bc5ce7559ad44b78e33acd739bfdc670d190cae1020472b
x86_64
autofs-5.0.5-113.el6.x86_64.rpm SHA-256: c0dd0d07a35a8ad67d230b7fbb5f8f5bb9799c2470e2bb1c635888e170814861
autofs-debuginfo-5.0.5-113.el6.x86_64.rpm SHA-256: c6b1f7be274a3b0586ed0acdc75966e42ec89398c91583fac2b7f264448cfe9a
i386
autofs-5.0.5-113.el6.i686.rpm SHA-256: 2fc0cb31216b4d6818bb7845ac3c213b9a729ed46a2b3b1861f0f25bdcbfa31e
autofs-debuginfo-5.0.5-113.el6.i686.rpm SHA-256: 03ac3c8d3b7a7d19f2a4656033db70379ec0e82f0ebedbe72dbf6c5e463df679

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
autofs-5.0.5-113.el6.src.rpm SHA-256: a3bc5d078e77245e9bc5ce7559ad44b78e33acd739bfdc670d190cae1020472b
s390x
autofs-5.0.5-113.el6.s390x.rpm SHA-256: d224f3c8fc68a81eae8b5f9972c4b5d756ec31b9ae6bf81c2a923f31792dd7ab
autofs-debuginfo-5.0.5-113.el6.s390x.rpm SHA-256: 23aeecf582c15ee544d08ea4beaee5e480a87d427bb91bd2e4ef1b8f7ec2704d

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter