atop through 2.11.0 allows local users to cause a denial of service (e.g., assertion failure and application exit) or possibly have unspecified other impact by running certain types of unprivileged processes while a different user runs atop.
https://rachelbythebay.com/w/2025/03/26/atop/
https://news.ycombinator.com/item?id=43485980
https://news.ycombinator.com/item?id=43477057
https://lists.debian.org/debian-lts-announce/2025/04/msg00013.html
https://github.com/Atoptool/atop
https://blog.bismuth.sh/blog/bismuth-found-the-atop-bug
http://www.openwall.com/lists/oss-security/2025/03/29/1
http://www.openwall.com/lists/oss-security/2025/03/27/3
http://www.openwall.com/lists/oss-security/2025/03/27/2
Published: 2025-03-26
Updated: 2025-04-07
Base Score: 1.2
Vector: CVSS2#AV:L/AC:H/Au:N/C:N/I:N/A:P
Severity: Low
Base Score: 2.9
Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Severity: Low
EPSS: 0.00015
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability Being Monitored