{
  "document": {
    "aggregate_severity": {
      "text": "Medium"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/rhel7els/vex/2021/cve-2021-20197-els_os-rhel7els.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-20T09:18:25Z",
      "generator": {
        "date": "2026-04-20T09:18:25Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CVE-2021-20197-ELS_OS-RHEL7ELS",
      "initial_release_date": "2021-03-26T17:15:00Z",
      "revision_history": [
        {
          "date": "2021-03-26T17:15:00Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-04-10T19:41:54Z",
          "number": "2",
          "summary": "Official Publication"
        },
        {
          "date": "2026-04-16T09:26:44Z",
          "number": "3",
          "summary": "Update document"
        },
        {
          "date": "2026-04-20T09:18:25Z",
          "number": "4",
          "summary": "Update document"
        }
      ],
      "status": "final",
      "version": "4"
    },
    "title": "Security update on CVE-2021-20197"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7",
                "product": {
                  "name": "Red Hat Enterprise Linux 7",
                  "product_id": "Red-Hat-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "binutils-0:2.27-44.base.el7_9.1.x86_64",
                "product": {
                  "name": "binutils-0:2.27-44.base.el7_9.1.x86_64",
                  "product_id": "binutils-0:2.27-44.base.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/binutils@2.27-44.base.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "binutils-devel-0:2.27-44.base.el7_9.1.x86_64",
                "product": {
                  "name": "binutils-devel-0:2.27-44.base.el7_9.1.x86_64",
                  "product_id": "binutils-devel-0:2.27-44.base.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/binutils-devel@2.27-44.base.el7_9.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "binutils-devel-0:2.27-44.base.el7_9.1.i686",
                "product": {
                  "name": "binutils-devel-0:2.27-44.base.el7_9.1.i686",
                  "product_id": "binutils-devel-0:2.27-44.base.el7_9.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/binutils-devel@2.27-44.base.el7_9.1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64",
                "product": {
                  "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64",
                  "product_id": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils-devel@2.27-44.base.el7_9.1.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "binutils-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64",
                "product": {
                  "name": "binutils-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64",
                  "product_id": "binutils-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils@2.27-44.base.el7_9.1.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "binutils-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64",
                "product": {
                  "name": "binutils-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64",
                  "product_id": "binutils-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils@2.27-44.base.el7_9.1.tuxcare.els4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64",
                "product": {
                  "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64",
                  "product_id": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils-devel@2.27-44.base.el7_9.1.tuxcare.els4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.i686",
                "product": {
                  "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.i686",
                  "product_id": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils-devel@2.27-44.base.el7_9.1.tuxcare.els2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.i686",
                "product": {
                  "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.i686",
                  "product_id": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils-devel@2.27-44.base.el7_9.1.tuxcare.els4?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64"
        },
        "product_reference": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.i686 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.i686"
        },
        "product_reference": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.i686",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:binutils-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64"
        },
        "product_reference": "binutils-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:binutils-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64"
        },
        "product_reference": "binutils-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64"
        },
        "product_reference": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.i686 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.i686"
        },
        "product_reference": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.i686",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-0:2.27-44.base.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:binutils-0:2.27-44.base.el7_9.1.x86_64"
        },
        "product_reference": "binutils-0:2.27-44.base.el7_9.1.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-devel-0:2.27-44.base.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.x86_64"
        },
        "product_reference": "binutils-devel-0:2.27-44.base.el7_9.1.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-devel-0:2.27-44.base.el7_9.1.i686 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.i686"
        },
        "product_reference": "binutils-devel-0:2.27-44.base.el7_9.1.i686",
        "relates_to_product_reference": "Red-Hat-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-20197",
      "cwe": {
        "id": "CWE-59",
        "name": "Improper Link Resolution Before File Access ('Link Following')"
      },
      "notes": [
        {
          "category": "description",
          "text": "There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "known_affected": [
          "Red-Hat-7:binutils-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64",
          "Red-Hat-7:binutils-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64",
          "Red-Hat-7:binutils-0:2.27-44.base.el7_9.1.x86_64",
          "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.i686",
          "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.i686",
          "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64",
          "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.i686",
          "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64",
          "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-20197"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1913743",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913743"
        },
        {
          "category": "external",
          "summary": "https://security.gentoo.org/glsa/202208-30",
          "url": "https://security.gentoo.org/glsa/202208-30"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20210528-0009/",
          "url": "https://security.netapp.com/advisory/ntap-20210528-0009/"
        },
        {
          "category": "external",
          "summary": "https://sourceware.org/bugzilla/show_bug.cgi?id=26945",
          "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26945"
        }
      ],
      "release_date": "2021-03-26T17:15:00Z",
      "remediations": [
        {
          "category": "no_fix_planned",
          "details": "CVE-2021-20197 is a local-only symlink race in GNU binutils (ar, objcopy, strip, ranlib) that becomes relevant only when these developer utilities are executed with elevated privileges against paths an attacker controls. Exploitation requires precise race timing and the ability to plant symlinks in the exact output location of a privileged run; these tools are not part of normal service execution, and administrative updates target system-owned directories rather than user-writable locations. Given the local vector, high attack complexity, and no availability impact, this issue can be safely deprioritized in managed enterprise VM/server environments.",
          "product_ids": [
            "Red-Hat-7:binutils-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64",
            "Red-Hat-7:binutils-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64",
            "Red-Hat-7:binutils-0:2.27-44.base.el7_9.1.x86_64",
            "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.i686",
            "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.i686",
            "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64",
            "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.i686",
            "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64",
            "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:binutils-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64",
            "Red-Hat-7:binutils-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64",
            "Red-Hat-7:binutils-0:2.27-44.base.el7_9.1.x86_64",
            "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.i686",
            "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.i686",
            "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els2.x86_64",
            "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.i686",
            "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els4.x86_64",
            "Red-Hat-7:binutils-devel-0:2.27-44.base.el7_9.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    }
  ]
}