MGASA-2024-0100

Source
https://advisories.mageia.org/MGASA-2024-0100.html
Import Source
https://advisories.mageia.org/MGASA-2024-0100.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0100
Related
Published
2024-03-31T03:27:58Z
Modified
2024-03-31T03:03:59Z
Summary
Updated aide & mhash packages fix security vulnerability
Details

AIDE before 0.17.4 allows local users to obtain root privileges via crafted file metadata (such as XFS extended attributes or tmpfs ACLs), because of a heap-based buffer overflow. (CVE-2021-45417)

References
Credits

Affected packages

Mageia:9 / aide

Package

Name
aide
Purl
pkg:rpm/mageia/aide?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.18.6-1.mga9

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / mhash

Package

Name
mhash
Purl
pkg:rpm/mageia/mhash?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.9.9-16.1.mga9

Ecosystem specific

{
    "section": "core"
}