-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5051-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso January 20, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : aide CVE ID : CVE-2021-45417 David Bouman discovered a heap-based buffer overflow vulnerability in the base64 functions of aide, an advanced intrusion detection system, which can be triggered via large extended file attributes or ACLs. This may result in denial of service or privilege escalation. For the oldstable distribution (buster), this problem has been fixed in version 0.16.1-1+deb10u1. For the stable distribution (bullseye), this problem has been fixed in version 0.17.3-4+deb11u1. We recommend that you upgrade your aide packages. For the detailed security status of aide please refer to its security tracker page at: https://security-tracker.debian.org/tracker/aide Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmHpqF1fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0R6uxAAohkCxTNn/+/sf9ywHCqNq0fcygIsqFvY1K9pvXu9goQHei088JyYtcf7 XiUZIqz1EQWlu02lAJmUlOk1VOpe/A9n39jSC9CghWyhAI1WLArM2vM+XV22MRDB mXB1ncaQsOT/9wpcPHx1P2m7esRZ50LWKF1fllF0aufF/LLrqihfKapuWXa1CG8t DVd8yLfnoNvtj4LMvPpziyrwPBeVFlFT2n3NGa5MtpUBmf6y2n+N85wm5I1n1NQf cuHJ6BryLTSZAxT9VJaTetoErxVK3QhWh2jmP6AEKCUn5KsX1pX6NWhpa5eMhBF0 86b+rQaLAbCj6Qdm/pEPCgGCq/EzzMt6rztF68BDmkoVNR2reA4PCQy7KwWUq0o1 HUPaAhbJDAr46iG/45/NuVPA/5Z//VZOsUqBMyIhWQR/EwM3HczVNMmyTrTZaZAA aiePsIzqqECkGZMquFRTPpe8wLKAfckYq3rkCnXx35SWWSiG+UGJA/rVV7R73gm3 FdlaCap7RGE7OiDAU8YPrUgvnht+6hJjnpUVtoP66WSzURk5Gx6L5Kd8eM/4265k Tu8qI9FzfR5XDhqgHPB0siImGKq6iedngo/NJundUPQ6+NQpKTmkJ/yPZ+wDaO6U k5UH+wknjv6/nzJM6KxyvECiYtKylzSrPynoimGvt/DedY+35cs= =yndN -----END PGP SIGNATURE-----