There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Binutils | Gnu | * | 2.35 (including) |
Red Hat Enterprise Linux 8 | RedHat | binutils-0:2.30-108.el8 | * |
Red Hat Enterprise Linux 8 | RedHat | binutils-0:2.30-108.el8 | * |
Binutils | Ubuntu | bionic | * |
Binutils | Ubuntu | esm-infra-legacy/trusty | * |
Binutils | Ubuntu | esm-infra/bionic | * |
Binutils | Ubuntu | esm-infra/xenial | * |
Binutils | Ubuntu | focal | * |
Binutils | Ubuntu | groovy | * |
Binutils | Ubuntu | precise/esm | * |
Binutils | Ubuntu | trusty | * |
Binutils | Ubuntu | trusty/esm | * |
Binutils | Ubuntu | upstream | * |
Binutils | Ubuntu | xenial | * |