There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
References
| Link | Resource |
|---|---|
| https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 | Issue Tracking Patch |
| https://ubuntu.com/security/notices/USN-5427-1 | Vendor Advisory |
| https://www.cve.org/CVERecord?id=CVE-2021-3899 | Third Party Advisory |
| https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 | Issue Tracking Patch |
| https://ubuntu.com/security/notices/USN-5427-1 | Vendor Advisory |
| https://www.cve.org/CVERecord?id=CVE-2021-3899 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
26 Aug 2025, 17:21
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Canonical
Canonical apport Canonical ubuntu Linux |
|
| CPE | cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:* cpe:2.3:a:canonical:apport:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* |
|
| References | () https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 - Issue Tracking, Patch | |
| References | () https://ubuntu.com/security/notices/USN-5427-1 - Vendor Advisory | |
| References | () https://www.cve.org/CVERecord?id=CVE-2021-3899 - Third Party Advisory |
21 Nov 2024, 06:22
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 - | |
| References | () https://ubuntu.com/security/notices/USN-5427-1 - | |
| References | () https://www.cve.org/CVERecord?id=CVE-2021-3899 - |
19 Aug 2024, 14:35
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| Summary |
|
|
| CWE | CWE-367 |
03 Jun 2024, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-06-03 19:15
Updated : 2025-08-26 17:21
NVD link : CVE-2021-3899
Mitre link : CVE-2021-3899
CVE.ORG link : CVE-2021-3899
JSON object : View
Products Affected
canonical
- ubuntu_linux
- apport
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
