First published: Wed Sep 25 2013(Updated: )
A certain Ubuntu build procedure for perf, as distributed in the Linux kernel packages in Ubuntu 10.04 LTS, 12.04 LTS, 12.10, 13.04, and 13.10, sets the HOME environment variable to the ~buildd directory and consequently reads the system configuration file from the ~buildd directory, which allows local users to gain privileges by leveraging control over the buildd account.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.04 | |
Ubuntu Linux | =13.10 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.04 | |
Ubuntu | =13.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1060 has a medium severity rating due to its potential to allow local privilege escalation.
To fix CVE-2013-1060, users should upgrade their affected Ubuntu systems to the latest versions released by Canonical.
CVE-2013-1060 affects Ubuntu 10.04 LTS, 12.04 LTS, 12.10, 13.04, and 13.10.
CVE-2013-1060 is not considered remotely exploitable; it requires local access to the system.
CVE-2013-1060 can lead to unauthorized access and potential modifications to system configurations by local users.