Bug 34139 - atop new security issue CVE-2025-31160
Summary: atop new security issue CVE-2025-31160
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal critical
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2025-03-28 08:55 CET by Nicolas Salguero
Modified: 2025-04-10 02:23 CEST (History)
3 users (show)

See Also:
Source RPM: atop-2.8.1-1.mga9.src.rpm
CVE: CVE-2025-31160
Status comment:


Attachments

Description Nicolas Salguero 2025-03-28 08:55:00 CET
CVE-2025-31160 was announced here:
https://www.openwall.com/lists/oss-security/2025/03/26/2
https://www.openwall.com/lists/oss-security/2025/03/26/3
https://rachelbythebay.com/w/2025/03/26/atop/
https://news.ycombinator.com/item?id=43485980
https://news.ycombinator.com/item?id=43477057

It seems that, for the moment, there is no fix yet and the advice is, do not use atop and, more important, do not run any binary from atop package as root.
Comment 1 Lewis Smith 2025-03-30 21:03:51 CEST
Another CVE with no fix yet.

Recognising that it is unfair, assigning to DavidG as the main updater of this package.

Status: NEW => UPSTREAM
Assignee: bugsquad => geiger.david68210
Source RPM: (none) => atop

Comment 2 Nicolas Salguero 2025-03-31 12:12:41 CEST
Some new information here:
https://www.openwall.com/lists/oss-security/2025/03/29/1
Nicolas Salguero 2025-03-31 12:13:31 CEST

Source RPM: atop => atop-2.11.0-1.mga10.src.rpm, atop-2.8.1-1.mga9.src.rpm
Whiteboard: (none) => MGA9TOO
CVE: (none) => CVE-2025-31160

Comment 3 Nicolas Salguero 2025-04-02 15:21:33 CEST
Upstream has issued an new version 2.11.1 to fix CVE-2025-31160. See: https://www.atoptool.nl/downloadatop.php.

Moreover, they provide a patch: https://www.atoptool.nl/download/fix-cve-2025-31160-v2.11.patch

openSUSE has issued an advisory on April 1:
https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K7T3QBXEP6TWTVJEMB47AVS2B2R5O5V/

Status: UPSTREAM => ASSIGNED
Status comment: (none) => Fixed upstream in 2.11.1 and patch available from upstream

Comment 4 Nicolas Salguero 2025-04-02 15:45:22 CEST
Cauldron already has version 2.11.1.

Version: Cauldron => 9
Whiteboard: MGA9TOO => (none)
Source RPM: atop-2.11.0-1.mga10.src.rpm, atop-2.8.1-1.mga9.src.rpm => atop-2.8.1-1.mga9.src.rpm

Comment 5 Nicolas Salguero 2025-04-04 09:19:04 CEST
Debian has issued an advisory on April 3:
https://lists.debian.org/debian-security-announce/2025/msg00054.html

Status comment: Fixed upstream in 2.11.1 and patch available from upstream => Fixed upstream in 2.11.1 and patch available from upstream and Debian

Comment 6 Nicolas Salguero 2025-04-04 09:34:54 CEST
Suggested advisory:
========================

The updated package fixes a security vulnerability:

atop through 2.11.0 allows local users to cause a denial of service (e.g., assertion failure and application exit) or possibly have unspecified other impact by running certain types of unprivileged processes while a different user runs atop. (CVE-2025-31160)

References:
https://www.openwall.com/lists/oss-security/2025/03/26/2
https://www.openwall.com/lists/oss-security/2025/03/26/3
https://rachelbythebay.com/w/2025/03/26/atop/
https://news.ycombinator.com/item?id=43485980
https://news.ycombinator.com/item?id=43477057
https://www.openwall.com/lists/oss-security/2025/03/29/1
https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K7T3QBXEP6TWTVJEMB47AVS2B2R5O5V/
https://lists.debian.org/debian-security-announce/2025/msg00054.html
========================

Updated package in core/updates_testing:
========================
atop-2.8.1-1.1.mga9

from SRPM:
atop-2.8.1-1.1.mga9.src.rpm

Status comment: Fixed upstream in 2.11.1 and patch available from upstream and Debian => *
Assignee: geiger.david68210 => qa-bugs

Nicolas Salguero 2025-04-04 09:34:59 CEST

Status comment: * => (none)

Comment 7 PC LX 2025-04-04 11:45:24 CEST
Installed and tested without issues.

Did some quick tests and it seems to be working correctly.



System: Mageia 9, x86_64, AMD Ryzen 5 5600G with Radeon Graphics using amdgpu driver.



$ uname -a
Linux jupiter 6.6.83-desktop-1.mga9 #1 SMP PREEMPT_DYNAMIC Sun Mar 16 01:09:35 UTC 2025 x86_64 GNU/Linux
$ rpm -q atop
atop-2.8.1-1.1.mga9

CC: (none) => mageia

Comment 8 PC LX 2025-04-06 03:27:48 CEST
This update has been working without issues for the past three days so I'm marking it as OK for x86_64.
Please if appropriate.

Whiteboard: (none) => MGA9-64-OK

katnatek 2025-04-06 05:13:46 CEST

Keywords: (none) => advisory

Comment 9 Thomas Andrews 2025-04-06 17:36:43 CEST
Validating.

Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Comment 10 Mageia Robot 2025-04-10 02:23:50 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2025-0129.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.