File _patchinfo of Package patchinfo.450
<patchinfo incident="450"> <issue id="913376" tracker="bnc">can't open autofs: No such file or directory at /sbin/insserv line 80</issue> <issue id="917977" tracker="bnc">VUL-0: EMBARGOED: CVE-2014-8169: autofs: potential privilege escalation via interpreter load path for program-based automount maps</issue> <issue id="909472" tracker="bnc">autofs.service: AUTOFS_OPTIONS not correctly passed to automount process</issue> <issue id="901448" tracker="bnc">autofs compiled with --disable-sloppy-mount doesn't allow -s option with mount - SLES12 GMC2</issue> <issue id="916203" tracker="bnc">autofs: sloppy mount option</issue> <issue id="CVE-2014-8169" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>mszeredi</packager> <description>autofs was updated to fix one security issue. This security issue was fixed: - CVE-2014-8169: Prevent potential privilege escalation via interpreter load path for program-based automount maps (bnc#917977). These non-security issues were fixed: - Dont pass sloppy option for other than nfs mounts (bnc#901448, bnc#916203) - Fix insserv warning at postinstall (bnc#913376) - Fix autofs.service so that multiple options passed through sysconfig AUTOFS_OPTIONS work correctly (bnc#909472) </description> <summary>Security update for autofs</summary> </patchinfo>