Scientific Linux Security Update : autofs on SL7.x x86_64 (20151119)

medium Nessus Plugin ID 87549

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

It was found that program-based automounter maps that used interpreted languages such as Python used standard environment variables to locate and load modules of those languages. A local attacker could potentially use this flaw to escalate their privileges on the system.
(CVE-2014-8169)

Note: This issue has been fixed by adding the 'AUTOFS_' prefix to the affected environment variables so that they are not used to subvert the system. A configuration option ('force_standard_program_map_env') to override this prefix and to use the environment variables without the prefix has been added. In addition, warnings have been added to the manual page and to the installed configuration file. Now, by default the standard variables of the program map are provided only with the prefix added to its name.

Notably, this update fixes the following bugs :

- When the 'ls *' command was run in the root of an indirect mount, autofs attempted to literally mount the wildcard character (*) causing it to be added to the negative cache. If done before a valid mount, autofs then failed on further mount attempts inside the mount point, valid or not. This has been fixed, and wildcard map entries now function in the described situation.

- When autofs encountered a syntax error consisting of a duplicate entry in a multimap entry, it reported an error and did not mount the map entry. With this update, autofs has been amended to report the problem in the log to alert the system administrator and use the last seen instance of the duplicate entry rather than fail.

- In the ldap and sss lookup modules, the map reading functions did not distinguish between the 'no entry found' and 'service not available' errors. Consequently, when the 'service not available' response was returned from a master map read, autofs did not update the mounts. An 'entry not found' return does not prevent the map update, so the ldap and sss lookup modules were updated to distinguish between these two returns and now work as expected.

In addition, this update adds the following enhancement :

- The description of the configuration parameter map_hash_table_size was missing from the autofs.conf(5) man page and its description in the configuration file comments was insufficient. A description of the parameter has been added to autofs.conf(5), and the configuration file comments have been updated.

Solution

Update the affected autofs and / or autofs-debuginfo packages.

See Also

http://www.nessus.org/u?97166658

Plugin Details

Severity: Medium

ID: 87549

File Name: sl_20151119_autofs_on_SL7_x.nasl

Version: 2.4

Type: local

Agent: unix

Published: 12/22/2015

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:autofs, p-cpe:/a:fermilab:scientific_linux:autofs-debuginfo, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 11/19/2015

Vulnerability Publication Date: 3/18/2015

Reference Information

CVE: CVE-2014-8169