Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20250722221328.GA8809@openwall.com>
Date: Wed, 23 Jul 2025 00:13:28 +0200
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Cc: Thiên Phú Hồ Ngọc <hongocthienphu17@...il.com>
Subject: non-issues in dailyaidecheck script in Debian's packaging of AIDE

Hi,

Ho Ngoc Thien Phu, CC'ed here, reported to linux-distros a couple of
ways to abuse "/usr/share/aide/bin/dailyaidecheck (shipped with AIDE
0.19.x in Debian and derivatives)" to run arbitrary commands, if the
configuration file /etc/default/aide is writable by the attacker.

However, that file is trusted input, it must not be writable by any
attacker, and indeed by default it is not.  The MAILCMD variable in the
file directly specifies a command to be run, so concerns about the
configuration file also allowing to run arbitrary commands in weirder
ways look irrelevant.

I am posting this to oss-security for the sake of completeness, because
it was on linux-distros.  Otherwise, there's nothing to see here.

That said, it's good that people are looking at AIDE and its packaging,
which I think is in need of a proper security audit.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.