CVE-2021-20197

EUVD-2021-7643
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
Link Following
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.3 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
CISA-ADPADP
6.3 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 30%
Affected Products (NVD)
VendorProductVersion
gnubinutils
𝑥
≤ 2.35
redhatenterprise_linux
8.0
netappcloud_backup
-
netappontap_select_deploy_administration_utility
-
netappsolidfire_\&_hci_management_node
-
broadcombrocade_fabric_operating_system_firmware
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
binutils
bookworm
2.40-2
fixed
bullseye
unimportant
sid
2.43.1-5
fixed
trixie
2.43.1-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
binutils
bionic
ignored
focal
ignored
groovy
ignored
hirsute
not-affected
impish
not-affected
jammy
not-affected
trusty
ignored
xenial
ignored