A certain Ubuntu build procedure for perf, as distributed in the Linux kernel packages in Ubuntu 10.04 LTS, 12.04 LTS, 12.10, 13.04, and 13.10, sets the HOME environment variable to the ~buildd directory and consequently reads the system configuration file from the ~buildd directory, which allows local users to gain privileges by leveraging control over the buildd account.
Advisories
Source ID Title
EUVD EUVD EUVD-2013-1100 A certain Ubuntu build procedure for perf, as distributed in the Linux kernel packages in Ubuntu 10.04 LTS, 12.04 LTS, 12.10, 13.04, and 13.10, sets the HOME environment variable to the ~buildd directory and consequently reads the system configuration file from the ~buildd directory, which allows local users to gain privileges by leveraging control over the buildd account.
Ubuntu USN Ubuntu USN USN-1938-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1939-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1940-1 Linux kernel (EC2) vulnerabilities
Ubuntu USN Ubuntu USN USN-1941-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1942-1 Linux kernel (OMAP4) vulnerabilities
Ubuntu USN Ubuntu USN USN-1943-1 Linux kernel (Raring HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-1944-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1945-1 Linux kernel (OMAP4) vulnerabilities
Ubuntu USN Ubuntu USN USN-1946-1 Linux kernel (OMAP4) vulnerabilities
Ubuntu USN Ubuntu USN USN-1947-1 Linux kernel (Quantal HWE) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2024-08-06T14:49:20.427Z

Reserved: 2013-01-11T00:00:00

Link: CVE-2013-1060

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-09-25T10:31:26.817

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-1060

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses