A certain Ubuntu build procedure for perf, as distributed in the Linux kernel packages in Ubuntu 10.04 LTS, 12.04 LTS, 12.10, 13.04, and 13.10, sets the HOME environment variable to the ~buildd directory and consequently reads the system configuration file from the ~buildd directory, which allows local users to gain privileges by leveraging control over the buildd account.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2013-1100 | A certain Ubuntu build procedure for perf, as distributed in the Linux kernel packages in Ubuntu 10.04 LTS, 12.04 LTS, 12.10, 13.04, and 13.10, sets the HOME environment variable to the ~buildd directory and consequently reads the system configuration file from the ~buildd directory, which allows local users to gain privileges by leveraging control over the buildd account. |
Ubuntu USN |
USN-1938-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1939-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1940-1 | Linux kernel (EC2) vulnerabilities |
Ubuntu USN |
USN-1941-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1942-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1943-1 | Linux kernel (Raring HWE) vulnerabilities |
Ubuntu USN |
USN-1944-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1945-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1946-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1947-1 | Linux kernel (Quantal HWE) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-08-06T14:49:20.427Z
Reserved: 2013-01-11T00:00:00
Link: CVE-2013-1060
No data.
Status : Deferred
Published: 2013-09-25T10:31:26.817
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-1060
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN