[CVE-2013-1060] perf configuration file vunerability
Andy Whitcroft
apw at canonical.com
Wed Jul 31 18:09:25 UTC 2013
Perf is being built without a prfix, this leads the system configuration
file to be sourced from the buildd users account rather than from /etc.
If someone could gain local access to the buildd user they could compromise
the account of any user using perf. Fix this up.
Following this email are patches for lucid, precise, quantal, and
raring.
Proposing for SRU to lucid, precise, quantal, and raring. This has
already been applied to saucy.
-apw
More information about the kernel-team
mailing list