htop hardening

Description

A short term mitigation for https://github.com/stealth/7350topless has been applied by Long term improvements are needed.

See talking point

I haven't looked deeply into the exploit code but could imagine that different symlink trickery still works. That's why I wrote 'quick&dirty workaround for the specific sed/symlink attack vector' in the commit message. Most probably a 'solution' would be to drop privileges prior to fiddling around in user homedirs. Or maybe removing this entire mess as a real fix.

Need to:
* determine if this custom solution is worth the risk / maintence / overhead
* are there better alternatives
* other fixes?

Environment

None

Checklist

hide

Activity

Show:

Igor Pecovnik May 3, 2022 at 5:40 AM

Closing since we won’t use that anymore.

Lane Jennison August 20, 2021 at 11:33 AM

Yep. Latest htop does network xfer and more. Time to retire

Werner August 20, 2021 at 5:35 AM

Probably best solution.

Igor Pecovnik August 16, 2021 at 5:58 PM

For long term - we probably just dismiss this functionality since its coming in htop 3.1?

Lane Jennison June 14, 2021 at 1:09 PM

Come up with a plan and document.

Done

Details

Assignee

Reporter

Components

Priority

Created May 24, 2021 at 11:31 AM
Updated August 30, 2022 at 3:45 PM
Resolved May 3, 2022 at 5:40 AM