CVE-2021-20197 — Link Following in Binutils
Severity
6.3MEDIUMNVD
EPSS
0.1%
top 69.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 26
Latest updateMay 24
Description
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:NExploitability: 1.0 | Impact: 5.2
Affected Packages3 packages
Also affects: Enterprise Linux 8.0
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-rq67-5wpf-96wv: There is an open race window when writing output in the following utilities in GNU binutils version 2↗2022-05-24
CVEList▶
CVE-2021-20197: There is an open race window when writing output in the following utilities in GNU binutils version 2↗2021-03-26
OSV▶
CVE-2021-20197: There is an open race window when writing output in the following utilities in GNU binutils version 2↗2021-03-26
📋Vendor Advisories
3Microsoft▶
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar objcopy strip ranlib. When these utilities are run as a privileged user (presuma↗2021-03-09
Debian▶
CVE-2021-20197: binutils - There is an open race window when writing output in the following utilities in G...↗2021