Mageia 2021-0341: binutils security update
Summary
This update provides binutils 2.36.1 and fixes atleast the following security
issues:
There's a flaw in the BFD library of binutils in versions before 2.36. An
attacker who supplies a crafted file to an application linked with BFD, and
using the DWARF functionality, could cause an impact to system availability
by way of excessive memory consumption (CVE-2021-3487).
There is an open race window when writing output in the following utilities
in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When
these utilities are run as a privileged user (presumably as part of a script
updating binaries across different users), an unprivileged user can trick
these utilities into getting ownership of arbitrary files through a symlink
(CVE-2021-20197).
For more info about the 2.36 update, see the sourceware link.
References
- https://bugs.mageia.org/show_bug.cgi?id=28305
- https://sourceware.org/pipermail/binutils/2021-January/115071.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20197
Resolution
MGASA-2021-0341 - Updated binutils packages fix security vulnerabilities
SRPMS
- 8/core/binutils-2.36.1-1.1.mga8