摘要:
aide security update
安全等级: Medium
公告ID: KylinSec-SA-2025-2860
发布日期: 2025年9月12日
关联CVE: CVE-2025-54389 CVE-2025-54409
Security Fix(es):
A vulnerability was found in AIDE up to 0.19.1 and classified as problematic.Using CWE to declare the problem leads to CWE-117. The product does not neutralize or incorrectly neutralizes output that is written to logs.Impacted is integrity.Upgrading to version 0.19.2 eliminates this vulnerability. The upgrade is hosted for download at github.com. Applying the patch 64c8f32b0349c33fb8382784af468338078851f9 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-54389)
AIDE is an advanced intrusion detection environment. From versions 0.13 to 0.19.1, there is a null pointer dereference vulnerability in AIDE. An attacker can crash the program during report printing or database listing after setting extended file attributes with an empty attribute value or with a key containing a comma. A local user might exploit this to cause a local denial of service. This issue has been patched in version 0.19.2. A workaround involves removing xattrs group from rules matching files on affected file systems.(CVE-2025-54409)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2025-54389 | KY3.4-5A | aide | Fixed |
CVE-2025-54409 | KY3.4-5A | aide | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
aide-help | noarch | 0.16.2-8.kb1.ky3_4 |
aide | x86_64 | 0.16.2-8.kb1.ky3_4 |
aide | aarch64 | 0.16.2-8.kb1.ky3_4 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名