[CVE-2013-1060] perf configuration file vunerability

Andy Whitcroft apw at canonical.com
Wed Jul 31 18:09:25 UTC 2013


Perf is being built without a prfix, this leads the system configuration
file to be sourced from the buildd users account rather than from /etc.
If someone could gain local access to the buildd user they could compromise
the account of any user using perf.  Fix this up.

Following this email are patches for lucid, precise, quantal, and
raring.

Proposing for SRU to lucid, precise, quantal, and raring.  This has
already been applied to saucy.

-apw




More information about the kernel-team mailing list