There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 | Issue Tracking Patch |
https://ubuntu.com/security/notices/USN-5427-1 | Vendor Advisory |
https://www.cve.org/CVERecord?id=CVE-2021-3899 | Third Party Advisory |
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 | Issue Tracking Patch |
https://ubuntu.com/security/notices/USN-5427-1 | Vendor Advisory |
https://www.cve.org/CVERecord?id=CVE-2021-3899 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
26 Aug 2025, 17:21
Type | Values Removed | Values Added |
---|---|---|
First Time |
Canonical
Canonical apport Canonical ubuntu Linux |
|
CPE | cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:* cpe:2.3:a:canonical:apport:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* |
|
References | () https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 - Issue Tracking, Patch | |
References | () https://ubuntu.com/security/notices/USN-5427-1 - Vendor Advisory | |
References | () https://www.cve.org/CVERecord?id=CVE-2021-3899 - Third Party Advisory |
21 Nov 2024, 06:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 - | |
References | () https://ubuntu.com/security/notices/USN-5427-1 - | |
References | () https://www.cve.org/CVERecord?id=CVE-2021-3899 - |
19 Aug 2024, 14:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
Summary |
|
|
CWE | CWE-367 |
03 Jun 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-03 19:15
Updated : 2025-08-26 17:21
NVD link : CVE-2021-3899
Mitre link : CVE-2021-3899
CVE.ORG link : CVE-2021-3899
JSON object : View
Products Affected
canonical
- apport
- ubuntu_linux
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition