ALT-BU-2025-5302-1
Branch c10f2 update bulletin.
Closed vulnerabilities
Modified: 2025-04-07
CVE-2025-31160
atop through 2.11.0 allows local users to cause a denial of service (e.g., assertion failure and application exit) or possibly have unspecified other impact by running certain types of unprivileged processes while a different user runs atop.
- http://www.openwall.com/lists/oss-security/2025/03/26/3
- http://www.openwall.com/lists/oss-security/2025/03/27/1
- http://www.openwall.com/lists/oss-security/2025/03/27/2
- http://www.openwall.com/lists/oss-security/2025/03/27/3
- http://www.openwall.com/lists/oss-security/2025/03/29/1
- https://blog.bismuth.sh/blog/bismuth-found-the-atop-bug
- https://github.com/Atoptool/atop
- https://lists.debian.org/debian-lts-announce/2025/04/msg00013.html
- https://news.ycombinator.com/item?id=43477057
- https://news.ycombinator.com/item?id=43485980
- https://rachelbythebay.com/w/2025/03/26/atop/
Closed bugs
Несовпадающие версии при использовании команд atop -V и rpm -q atop
Closed vulnerabilities
Modified: 2025-04-02
CVE-2021-33643
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.
- FEDORA-2022-88772d0a2d
- FEDORA-2022-88772d0a2d
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-44a20bba43
- FEDORA-2022-44a20bba43
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-50e8a1b51d
- FEDORA-2022-50e8a1b51d
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807
Modified: 2025-04-02
CVE-2021-33644
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.
- FEDORA-2022-88772d0a2d
- FEDORA-2022-88772d0a2d
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-44a20bba43
- FEDORA-2022-44a20bba43
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-50e8a1b51d
- FEDORA-2022-50e8a1b51d
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807
Modified: 2025-04-02
CVE-2021-33645
The th_read() function doesn’t free a variable t->th_buf.gnu_longlink after allocating memory, which may cause a memory leak.
- FEDORA-2022-88772d0a2d
- FEDORA-2022-88772d0a2d
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-44a20bba43
- FEDORA-2022-44a20bba43
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-50e8a1b51d
- FEDORA-2022-50e8a1b51d
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807
Modified: 2025-04-02
CVE-2021-33646
The th_read() function doesn’t free a variable t->th_buf.gnu_longname after allocating memory, which may cause a memory leak.
- FEDORA-2022-88772d0a2d
- FEDORA-2022-88772d0a2d
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-44a20bba43
- FEDORA-2022-44a20bba43
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-50e8a1b51d
- FEDORA-2022-50e8a1b51d
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807