Package: procps
Version: 2:3.3.9-9+deb8u1
Severity: minor
Control: found -1 2:3.3.12-3+deb9u1
Control: affects -1 + security.debian.org
Control: affects -1 + release.debian.org

For the security update released as DSA-4208-1 we only explicitly
applied the fixes needed for the securiy issues without trying to
touch other parts. 

top though changed for CVE-2018-1122 it's behaviour.

CVE-2018-1122

    top read its configuration from the current working directory if no
    $HOME was configured. If top were started from a directory writable
    by the attacker (such as /tmp) this could result in local privilege
    escalation.

The documentation reads as:

> If the $HOME variable is not present, top will try to write the
> personal configuration file to the current directory, subject to
> permissions.

This is not anymore the case.

A future update for procps in stable (via point release? e.g. to
apply the further hardening measures and bugfixes?) could hopefully
rectify the documentation as well.

Regards,
Salvatore

Reply via email to