{"id":"USN-5243-2","summary":"aide vulnerability","details":"USN-5243-1 fixed a vulnerability in aide. This update provides\nthe corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.\n\n\nOriginal advisory details:\n\n David Bouman discovered that AIDE incorrectly handled base64 operations. A\n local attacker could use this issue to cause AIDE to crash, resulting in a\n denial of service, or possibly execute arbitrary code.\n","modified":"2026-02-10T04:42:25Z","published":"2022-01-20T16:12:06Z","related":["UBUNTU-CVE-2021-45417"],"upstream":["CVE-2021-45417","UBUNTU-CVE-2021-45417"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5243-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-45417"}],"affected":[{"package":{"name":"aide","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/aide@0.16~a2.git20130520-2ubuntu0.1+esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.16~a2.git20130520-2ubuntu0.1+esm1"}]}],"versions":["0.15.1-8ubuntu2","0.16~a2.git20130520-2","0.16~a2.git20130520-2ubuntu0.1"],"ecosystem_specific":{"binaries":[{"binary_version":"0.16~a2.git20130520-2ubuntu0.1+esm1","binary_name":"aide"},{"binary_version":"0.16~a2.git20130520-2ubuntu0.1+esm1","binary_name":"aide-common"},{"binary_version":"0.16~a2.git20130520-2ubuntu0.1+esm1","binary_name":"aide-dynamic"},{"binary_version":"0.16~a2.git20130520-2ubuntu0.1+esm1","binary_name":"aide-xen"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-45417"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5243-2.json"}},{"package":{"name":"aide","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/aide@0.16~a2.git20130520-3ubuntu0.1~esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.16~a2.git20130520-3ubuntu0.1~esm1"}]}],"versions":["0.16~a2.git20130520-3"],"ecosystem_specific":{"binaries":[{"binary_version":"0.16~a2.git20130520-3ubuntu0.1~esm1","binary_name":"aide"},{"binary_version":"0.16~a2.git20130520-3ubuntu0.1~esm1","binary_name":"aide-common"},{"binary_version":"0.16~a2.git20130520-3ubuntu0.1~esm1","binary_name":"aide-dynamic"},{"binary_version":"0.16~a2.git20130520-3ubuntu0.1~esm1","binary_name":"aide-xen"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-45417"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5243-2.json"}}],"schema_version":"1.7.3"}