CVE-2021-20197

There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
Link Following
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.3 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 40%
VendorProductVersion
gnubinutils
𝑥
≤ 2.35
redhatenterprise_linux
8.0
netappcloud_backup
-
netappontap_select_deploy_administration_utility
-
netappsolidfire_\&_hci_management_node
-
broadcombrocade_fabric_operating_system_firmware
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
binutils
bullseye
unimportant
bookworm
2.40-2
fixed
sid
2.43.1-5
fixed
trixie
2.43.1-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
binutils
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
ignored
focal
ignored
bionic
ignored
xenial
ignored
trusty
ignored