MGASA-2021-0341 - Updated binutils packages fix security vulnerabilities

Publication date: 12 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0341.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2021-3487,
     CVE-2021-20197

This update provides binutils 2.36.1 and fixes atleast the following security
issues:

There's a flaw in the BFD library of binutils in versions before 2.36. An
attacker who supplies a crafted file to an application linked with BFD, and
using the DWARF functionality, could cause an impact to system availability
by way of excessive memory consumption (CVE-2021-3487).

There is an open race window when writing output in the following utilities
in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When
these utilities are run as a privileged user (presumably as part of a script
updating binaries across different users), an unprivileged user can trick
these utilities into getting ownership of arbitrary files through a symlink
(CVE-2021-20197).

For more info about the 2.36 update, see the sourceware link.

References:
- https://bugs.mageia.org/show_bug.cgi?id=28305
- https://sourceware.org/pipermail/binutils/2021-January/115071.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20197

SRPMS:
- 8/core/binutils-2.36.1-1.1.mga8

Mageia 2021-0341: binutils security update

This update provides binutils 2.36.1 and fixes atleast the following security issues: There's a flaw in the BFD library of binutils in versions before 2.36

Summary

This update provides binutils 2.36.1 and fixes atleast the following security issues:
There's a flaw in the BFD library of binutils in versions before 2.36. An attacker who supplies a crafted file to an application linked with BFD, and using the DWARF functionality, could cause an impact to system availability by way of excessive memory consumption (CVE-2021-3487).
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink (CVE-2021-20197).
For more info about the 2.36 update, see the sourceware link.

References

- https://bugs.mageia.org/show_bug.cgi?id=28305

- https://sourceware.org/pipermail/binutils/2021-January/115071.html

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20197

Resolution

MGASA-2021-0341 - Updated binutils packages fix security vulnerabilities

SRPMS

- 8/core/binutils-2.36.1-1.1.mga8

Severity
Publication date: 12 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0341.html
Type: security
CVE: CVE-2021-3487, CVE-2021-20197

Related News