First published: Thu Jan 07 2021(Updated: )
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink. Reference: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26945">https://sourceware.org/bugzilla/show_bug.cgi?id=26945</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Binutils | <2.35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1913743 is considered high due to the potential for privilege escalation by unprivileged users.
To fix REDHAT-BUG-1913743, update to GNU binutils version 2.36 or later where the race condition has been resolved.
The utilities affected by REDHAT-BUG-1913743 include ar, objcopy, strip, and ranlib in GNU binutils version 2.35 and earlier.
Users running GNU binutils version 2.35 or earlier as privileged users are at risk from REDHAT-BUG-1913743.
REDHAT-BUG-1913743 is classified as a race condition vulnerability that may lead to privilege escalation.