vulnerability
Debian: CVE-2021-20197: binutils -- security update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
3 | (AV:L/AC:M/Au:N/C:P/I:P/A:N) | 03/26/2021 | 07/30/2024 | 07/30/2024 |
Severity
3
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:N)
Published
03/26/2021
Added
07/30/2024
Modified
07/30/2024
Description
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
Solution
debian-upgrade-binutils

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.