Unrated severityNVD Advisory· Published Jan 20, 2022· Updated Aug 4, 2024
CVE-2021-45417
CVE-2021-45417
Description
AIDE before 0.17.4 allows local users to obtain root privileges via crafted file metadata (such as XFS extended attributes or tmpfs ACLs), because of a heap-based buffer overflow.
Affected products
42- AIDE/AIDEdescription
- osv-coords41 versionspkg:rpm/almalinux/aidepkg:rpm/opensuse/aide&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/aide&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/seamonkey&distro=openSUSE%20Leap%2015.3pkg:rpm/suse/aide&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/aide&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/aide&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-ESPOSpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2015%20SP2pkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-BCLpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/aide&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/aide&distro=SUSE%20Manager%20Proxy%204.1pkg:rpm/suse/aide&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.1pkg:rpm/suse/aide&distro=SUSE%20Manager%20Server%204.1pkg:rpm/suse/aide&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/aide&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/aide&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/aide&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
< 0.16-14.el8_5.1+ 40 more
- (no CPE)range: < 0.16-14.el8_5.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.17.4-1.1
- (no CPE)range: < 2.53.12-lp153.17.8.2
- (no CPE)range: < 0.16-20.15.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.13.1-40.16.6.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.13.1-40.16.6.1
- (no CPE)range: < 0.16-20.15.1
- (no CPE)range: < 0.16-20.15.1
- (no CPE)range: < 0.16-20.15.1
- (no CPE)range: < 0.16-20.15.1
- (no CPE)range: < 0.16-20.15.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-20.15.1
- (no CPE)range: < 0.16-20.15.1
- (no CPE)range: < 0.16-20.15.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-24.1
- (no CPE)range: < 0.16-20.15.1
- (no CPE)range: < 0.16-20.15.1
- (no CPE)range: < 0.16-20.15.1
- (no CPE)range: < 0.16-20.15.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- security.gentoo.org/glsa/202311-07mitrevendor-advisory
- www.debian.org/security/2022/dsa-5051mitrevendor-advisory
- www.openwall.com/lists/oss-security/2022/01/20/3mitremailing-list
- lists.debian.org/debian-lts-announce/2022/01/msg00024.htmlmitremailing-list
- www.ipi.fi/pipermail/aide/2022-January/001713.htmlmitre
- www.openwall.com/lists/oss-security/2022/01/20/3mitre
News mentions
0No linked articles in our index yet.