It was discovered that Atop, a monitor tool for system resources and
process activity, always tried to connect to the port of atopgpud
(an additional daemon gathering GPU statistics not shipped in Debian)
while performing insufficient sanitising of the data read from this
port.
With this update, additional validation is added and by default atop
no longer tries to connect to the atopgpud daemon port unless explicitly
enabled via -k.
More Stories
mingw-poppler-24.08.0-4.fc42
FEDORA-2025-67d2e84a2b Packages in this update: mingw-poppler-24.08.0-4.fc42 Update description: Backport fixes for CVE-2025-32364 and CVE-2025-32365. Read More
mingw-poppler-24.02.0-5.fc40
FEDORA-2025-bce8e14ac6 Packages in this update: mingw-poppler-24.02.0-5.fc40 Update description: Backport fixes for CVE-2025-32364 and CVE-2025-32365. Read More
mingw-poppler-24.02.0-5.fc41
FEDORA-2025-5e9faa5173 Packages in this update: mingw-poppler-24.02.0-5.fc41 Update description: Backport fixes for CVE-2025-32364 and CVE-2025-32365. Read More
USN-7439-1: QuickJS vulnerabilities
It was discovered that QuickJS could be forced to reference uninitialized memory in certain instances. An attacker could possibly use...
USN-7438-1: 7-Zip vulnerabilities
Igor Pavlov discovered that 7-Zip had several memory-related issues. An attacker could possibly use these issues to cause 7-Zip to...
mingw-libsoup-2.74.3-10.fc41
FEDORA-2025-8d023de6cb Packages in this update: mingw-libsoup-2.74.3-10.fc41 Update description: Backport fixes for CVE-2025-32050 CVE-2025-32052 CVE-2025-32053 CVE-2025-32906 CVE-2025-32907 CVE-2025-32909 Read More