Description: perf_event_open() and execve() race in setuid programs allows a data leak References: https://bugzilla.redhat.com/show_bug.cgi?id=1701245 https://bugs.chromium.org/p/project-zero/issues/detail?id=807 https://www.openwall.com/lists/oss-security/2019/04/03/4 Notes: Bugs: upstream: released (4.6-rc6) [79c9ce57eb2d5f1497546a3946b4ae21b6fdc438] 4.19-upstream-stable: N/A "Fixed before branching point" 4.9-upstream-stable: N/A "Fixed before branching point" 3.16-upstream-stable: released (3.16.66) [92cb82fec63d558f7eecc97afbbbdf3fe5ef95b5] sid: released (4.6.1-1) 4.9-stretch-security: N/A "Fixed before branching point" 3.16-jessie-security: released (3.16.68-1)