procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-05-23 07:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-1122
Mitre link : CVE-2018-1122
JSON object : View
CWE
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
procps-ng_project
- procps-ng