Package: procps Version: 2:3.3.9-9+deb8u1 Severity: minor Control: found -1 2:3.3.12-3+deb9u1 Control: affects -1 + security.debian.org Control: affects -1 + release.debian.org
For the security update released as DSA-4208-1 we only explicitly applied the fixes needed for the securiy issues without trying to touch other parts. top though changed for CVE-2018-1122 it's behaviour. CVE-2018-1122 top read its configuration from the current working directory if no $HOME was configured. If top were started from a directory writable by the attacker (such as /tmp) this could result in local privilege escalation. The documentation reads as: > If the $HOME variable is not present, top will try to write the > personal configuration file to the current directory, subject to > permissions. This is not anymore the case. A future update for procps in stable (via point release? e.g. to apply the further hardening measures and bugfixes?) could hopefully rectify the documentation as well. Regards, Salvatore