Security update for autofs
| Announcement ID: | SUSE-SU-2015:1020-1 |
|---|---|
| Rating: | moderate |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves one vulnerability and has four security fixes can now be installed.
Description:
autofs was updated to fix one security issue.
This security issue was fixed: - CVE-2014-8169: Prevent potential privilege escalation via interpreter load path for program-based automount maps (bnc#917977).
These non-security issues were fixed: - Dont pass sloppy option for other than nfs mounts (bnc#901448, bnc#916203) - Fix insserv warning at postinstall (bnc#913376) - Fix autofs.service so that multiple options passed through sysconfig AUTOFS_OPTIONS work correctly (bnc#909472)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Desktop 12
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-248=1 -
SUSE Linux Enterprise Server 12
zypper in -t patch SUSE-SLE-SERVER-12-2015-248=1 -
SUSE Linux Enterprise Server for SAP Applications 12
zypper in -t patch SUSE-SLE-SERVER-12-2015-248=1
Package List:
-
SUSE Linux Enterprise Desktop 12 (x86_64)
- autofs-debuginfo-5.0.9-8.1
- autofs-debugsource-5.0.9-8.1
- autofs-5.0.9-8.1
-
SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64)
- autofs-debuginfo-5.0.9-8.1
- autofs-debugsource-5.0.9-8.1
- autofs-5.0.9-8.1
-
SUSE Linux Enterprise Server for SAP Applications 12 (x86_64)
- autofs-debuginfo-5.0.9-8.1
- autofs-debugsource-5.0.9-8.1
- autofs-5.0.9-8.1