{"id":"CVE-2021-45417","details":"AIDE before 0.17.4 allows local users to obtain root privileges via crafted file metadata (such as XFS extended attributes or tmpfs ACLs), because of a heap-based buffer overflow.","modified":"2026-04-02T07:36:07.625518Z","published":"2022-01-20T18:15:07.640Z","related":["ALSA-2022:0441","MGASA-2024-0100","SUSE-SU-2022:0145-1","SUSE-SU-2022:0150-1","SUSE-SU-2022:0150-2","SUSE-SU-2022:14879-1","openSUSE-SU-2022:0150-1","openSUSE-SU-2024:11960-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/01/msg00024.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202311-07"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5051"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2022/01/20/3"},{"type":"FIX","url":"https://www.ipi.fi/pipermail/aide/2022-January/001713.html"},{"type":"FIX","url":"https://www.openwall.com/lists/oss-security/2022/01/20/3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/aide/aide","events":[{"introduced":"0"},{"last_affected":"d4b80a9e5d48494e0003d22d9ce1a8133de0f15e"}],"database_specific":{"versions":[{"introduced":"0.13"},{"last_affected":"0.17.3"}]}}],"versions":["aide.0.10.release","aide.0.11.rc1.release","aide.0.11.rc2.release","aide.0.11.rc3.release","aide.0.11.release","aide.0.11a.debian","aide.0.11b.nocurl","aide.0.12.rc1.release","aide.0.12.rc2.release","aide.0.12.release","aide.0.13.1.release","aide.0.13.rc1.release","aide.0.13.rc2.release","aide.0.13.release","aide.0.14.1.release","aide.0.14.2.release","aide.0.14.rc1.release","aide.0.14.rc2.release","aide.0.14.rc3.release","aide.0.14.release","aide.0.15.1.release","aide.0.15.rc1.release","aide.0.15.release","cs.tut.fi.import","v0.16","v0.16.1","v0.16.2","v0.16a1","v0.16a2","v0.16b1","v0.16rc1","v0.17","v0.17.1","v0.17.2","v0.17.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-45417.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.4.10"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]},{"events":[{"introduced":"0"},{"last_affected":"21.04"}]},{"events":[{"introduced":"0"},{"last_affected":"21.10"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}