MGASA-2021-0341 - Updated binutils packages fix security vulnerabilities

Publication date: 12 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0341.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2021-3487,
     CVE-2021-20197

This update provides binutils 2.36.1 and fixes atleast the following security
issues:

There's a flaw in the BFD library of binutils in versions before 2.36. An
attacker who supplies a crafted file to an application linked with BFD, and
using the DWARF functionality, could cause an impact to system availability
by way of excessive memory consumption (CVE-2021-3487).

There is an open race window when writing output in the following utilities
in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When
these utilities are run as a privileged user (presumably as part of a script
updating binaries across different users), an unprivileged user can trick
these utilities into getting ownership of arbitrary files through a symlink
(CVE-2021-20197).

For more info about the 2.36 update, see the sourceware link.

References:
- https://bugs.mageia.org/show_bug.cgi?id=28305
- https://sourceware.org/pipermail/binutils/2021-January/115071.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20197

SRPMS:
- 8/core/binutils-2.36.1-1.1.mga8