File _patchinfo of Package patchinfo.450
<patchinfo incident="450">
<issue id="913376" tracker="bnc">can't open autofs: No such file or directory at /sbin/insserv line 80</issue>
<issue id="917977" tracker="bnc">VUL-0: EMBARGOED: CVE-2014-8169: autofs: potential privilege escalation via interpreter load path for program-based automount maps</issue>
<issue id="909472" tracker="bnc">autofs.service: AUTOFS_OPTIONS not correctly passed to automount process</issue>
<issue id="901448" tracker="bnc">autofs compiled with --disable-sloppy-mount doesn't allow -s option with mount - SLES12 GMC2</issue>
<issue id="916203" tracker="bnc">autofs: sloppy mount option</issue>
<issue id="CVE-2014-8169" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>mszeredi</packager>
<description>autofs was updated to fix one security issue.
This security issue was fixed:
- CVE-2014-8169: Prevent potential privilege escalation via interpreter load path for program-based automount maps (bnc#917977).
These non-security issues were fixed:
- Dont pass sloppy option for other than nfs mounts (bnc#901448, bnc#916203)
- Fix insserv warning at postinstall (bnc#913376)
- Fix autofs.service so that multiple options passed through sysconfig AUTOFS_OPTIONS work correctly (bnc#909472)
</description>
<summary>Security update for autofs</summary>
</patchinfo>