GNU bug report logs

#47420 binutils is vulnerable to CVE-2021-20197 (and various others)

PackageSource(s)Maintainer(s)
guix PTS Buildd Popcon
Full log

Message #18 received at 47420-done@debbugs.gnu.org (full text, mbox, reply):

Received: (at 47420-done) by debbugs.gnu.org; 23 Mar 2022 02:31:17 +0000
From debbugs-submit-bounces@debbugs.gnu.org Tue Mar 22 22:31:17 2022
Received: from localhost ([127.0.0.1]:42259 helo=debbugs.gnu.org)
	by debbugs.gnu.org with esmtp (Exim 4.84_2)
	(envelope-from <debbugs-submit-bounces@debbugs.gnu.org>)
	id 1nWqmL-00086A-Ca
	for submit@debbugs.gnu.org; Tue, 22 Mar 2022 22:31:17 -0400
Received: from mail-qt1-f170.google.com ([209.85.160.170]:41586)
 by debbugs.gnu.org with esmtp (Exim 4.84_2)
 (envelope-from <maxim.cournoyer@gmail.com>) id 1nWqmJ-00080K-Ee
 for 47420-done@debbugs.gnu.org; Tue, 22 Mar 2022 22:31:15 -0400
Received: by mail-qt1-f170.google.com with SMTP id d15so168993qty.8
 for <47420-done@debbugs.gnu.org>; Tue, 22 Mar 2022 19:31:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;
 h=from:to:cc:subject:references:date:in-reply-to:message-id
 :user-agent:mime-version:content-transfer-encoding;
 bh=EB/mamltYkuAFQCcwPdazjFsjRoVX3YhMMD1BV3+tUs=;
 b=PWIjeKZyQXrzZSNqZ6pEUAFGsclfKk20UMvqQY4Dnhw+npCb+QBRWOWbXNmYIV8Qt8
 ovUqbxStKniu2Ppa0kt7KeN3n5suKeNnXYl/VsTZzwOvaLStUHvtE5BmOIBtT34piUmu
 XIK6YllREpYbwQ8NKqdsy7+/gCpjjxMUkZR2/LwWrsAhB7U/fSS/4XOJ/iX2pnJgZ7TT
 dqdpwkuav+/fgG8YUOoPiGWgAT1Fv+IbOWbGCDW7Kr3Zal+ZJyevk6MD2G0DsEkvdPpC
 vCXvMA1721RO8IhrvDetKIo2rQyintoUE4RqD7gVPWPKjKiIhWTvY86Py9LLTxHRb7Za
 ZkNg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20210112;
 h=x-gm-message-state:from:to:cc:subject:references:date:in-reply-to
 :message-id:user-agent:mime-version:content-transfer-encoding;
 bh=EB/mamltYkuAFQCcwPdazjFsjRoVX3YhMMD1BV3+tUs=;
 b=H249+xfmjLYRJC09nGowssmOgcsCcIYy5NAntTIEy9bSVx5c0cbX+mrFpN8nl/wOUe
 Y2Rc7M/WgDvoBJ2iu38vlzC6faOxayG+jGonotbJSALm5/sIit8hzv2V+HQ9lHm/m0+g
 +eatlYwjY09vFH7TeZykcZcgSZPpDxNFTInLN5Aeo6d340rpT+sZuZoNjciwC0N35qtA
 yeEG0Ro3hKSJQbR9ggBT5kybQkcsCRafr0Nm1NJVIvK+D8MgJL5h7fZu1KfpcKCcD7LU
 QHhNy6TNN/fgz3MTyvQSlr5Mb85TkZ/mAlQNp6jlAN6oLe/KZ2MUwyjgqwKRTrR/n1jb
 mM8w==
X-Gm-Message-State: AOAM533PTQhQzst2k7a2mmRVD2WFliqo3TJ18zM7qTCpvzVXVvyTjz7y
 VHvjRyHzy00VvbczHEh3huZST08rW0k=
X-Google-Smtp-Source: ABdhPJxlJ18Cy3wj+59Tbq4SbL1SlcdCNjY50KjfwdK3QH42X6ACnAS5XyjESJNOtCAgAVZ/nahKnQ==
X-Received: by 2002:ac8:5a10:0:b0:2e1:cab4:2066 with SMTP id
 n16-20020ac85a10000000b002e1cab42066mr22152654qta.199.1648002669814; 
 Tue, 22 Mar 2022 19:31:09 -0700 (PDT)
Received: from hurd (dsl-10-129-199.b2b2c.ca. [72.10.129.199])
 by smtp.gmail.com with ESMTPSA id
 u21-20020ae9c015000000b0067d4b2e1050sm9858416qkk.55.2022.03.22.19.31.07
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Tue, 22 Mar 2022 19:31:08 -0700 (PDT)
From: Maxim Cournoyer <maxim.cournoyer@gmail.com>
To: Maxime Devos <maximedevos@telenet.be>
Subject: Re: bug#47420: binutils is vulnerable to CVE-2021-20197 (and
 various others)
References: <669bea321d23f39ac5bb902dc930f4056f07ec78.camel@zaclys.net>
 <d12edf9cd3c7a6779c25ccd40411c16292406e8d.camel@telenet.be>
Date: Tue, 22 Mar 2022 22:31:06 -0400
In-Reply-To: <d12edf9cd3c7a6779c25ccd40411c16292406e8d.camel@telenet.be>
 (Maxime Devos's message of "Sat, 27 Mar 2021 00:00:40 +0100")
Message-ID: <87czid1jth.fsf@gmail.com>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
X-Spam-Score: -0.0 (/)
X-Debbugs-Envelope-To: 47420-done
Cc: 47420-done@debbugs.gnu.org,
 Léo Le Bouter <lle-bout@zaclys.net>
X-BeenThere: debbugs-submit@debbugs.gnu.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: <debbugs-submit.debbugs.gnu.org>
List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, 
 <mailto:debbugs-submit-request@debbugs.gnu.org?subject=unsubscribe>
List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/>
List-Post: <mailto:debbugs-submit@debbugs.gnu.org>
List-Help: <mailto:debbugs-submit-request@debbugs.gnu.org?subject=help>
List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, 
 <mailto:debbugs-submit-request@debbugs.gnu.org?subject=subscribe>
Errors-To: debbugs-submit-bounces@debbugs.gnu.org
Sender: "Debbugs-submit" <debbugs-submit-bounces@debbugs.gnu.org>
X-Spam-Score: -1.0 (-)
Hi,

Maxime Devos <maximedevos@telenet.be> writes:

> On Fri, 2021-03-26 at 21:41 +0100, Léo Le Bouter via Bug reports for GNU Guix wrote:
>> CVE-2021-20197	18:15
>> There is an open race window when writing output in the following
>> utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip,
>> ranlib. When these utilities are run as a privileged user (presumably
>> as part of a script updating binaries across different users), an
>> unprivileged user can trick these utilities into getting ownership of
>> arbitrary files through a symlink.

Our current version of binutilsis now 2.37, immune to the CVE reported
here.

Thanks for the report!

Closing.

Maxim




Send a report that this bug log contains spam.


debbugs.gnu.org maintainers <help-debbugs@gnu.org>. Last modified: Thu Mar 13 14:43:17 2025; Machine Name: wallace-server

GNU bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.