Unrated severityNVD Advisory· Published Mar 18, 2015· Updated May 6, 2026
CVE-2014-8169
CVE-2014-8169
Description
automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.
Affected products
7- cpe:2.3:a:automount_project:automount:5.0.8:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- lists.opensuse.org/opensuse-updates/2015-03/msg00033.htmlnvdVendor Advisory
- rhn.redhat.com/errata/RHSA-2015-1344.htmlnvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue Tracking
- bugzilla.suse.com/show_bug.cginvdIssue Tracking
- www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlnvd
- www.securityfocus.com/bid/73211nvd
- www.ubuntu.com/usn/USN-2579-1nvd
News mentions
0No linked articles in our index yet.