It was discovered that Atop, a monitor tool for system resources and
process activity, always tried to connect to the port of atopgpud
(an additional daemon gathering GPU statistics not shipped in Debian)
while performing insufficient sanitising of the data read from this
port.
With this update, additional validation is added and by default atop
no longer tries to connect to the atopgpud daemon port unless explicitly
enabled via -k.
More Stories
USN-7455-4: Linux kernel (Oracle) vulnerabilities
Jann Horn discovered that the watch_queue event notification subsystem in the Linux kernel contained an out-of-bounds write vulnerability. A local...
Commvault Command Center Path Traversal Vulnerability (CVE-2025-34028)
What is the Vulnerability?A critical path traversal vulnerability has been identified in Commvault's Command Center Innovation Release. The vulnerability, tracked...
chromium-135.0.7049.114-1.fc41
FEDORA-2025-9ea1ed1fcf Packages in this update: chromium-135.0.7049.114-1.fc41 Update description: Update to 135.0.7049.114 Read More
chromium-135.0.7049.114-1.el10_1
FEDORA-EPEL-2025-41e9d3ba95 Packages in this update: chromium-135.0.7049.114-1.el10_1 Update description: Update to 135.0.7049.114 Read More
chromium-135.0.7049.114-1.fc42
FEDORA-2025-ca9bc14500 Packages in this update: chromium-135.0.7049.114-1.fc42 Update description: Update to 135.0.7049.114 Read More
chromium-135.0.7049.114-1.el9
FEDORA-EPEL-2025-1f10cd8fe7 Packages in this update: chromium-135.0.7049.114-1.el9 Update description: Update to 135.0.7049.114 Read More