CVE-2021-3899

There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
Configurations

Configuration 1 (hide)

cpe:2.3:a:canonical:apport:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*

History

26 Aug 2025, 17:21

Type Values Removed Values Added
First Time Canonical
Canonical apport
Canonical ubuntu Linux
CPE cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
cpe:2.3:a:canonical:apport:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
References () https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 - () https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 - Issue Tracking, Patch
References () https://ubuntu.com/security/notices/USN-5427-1 - () https://ubuntu.com/security/notices/USN-5427-1 - Vendor Advisory
References () https://www.cve.org/CVERecord?id=CVE-2021-3899 - () https://www.cve.org/CVERecord?id=CVE-2021-3899 - Third Party Advisory

21 Nov 2024, 06:22

Type Values Removed Values Added
References () https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 - () https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 -
References () https://ubuntu.com/security/notices/USN-5427-1 - () https://ubuntu.com/security/notices/USN-5427-1 -
References () https://www.cve.org/CVERecord?id=CVE-2021-3899 - () https://www.cve.org/CVERecord?id=CVE-2021-3899 -

19 Aug 2024, 14:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
Summary
  • (es) Existe una condición de ejecución en la detección de 'ejecutable reemplazado' que, con la configuración local correcta, permite a un atacante ejecutar código arbitrario como root.
CWE CWE-367

03 Jun 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-03 19:15

Updated : 2025-08-26 17:21


NVD link : CVE-2021-3899

Mitre link : CVE-2021-3899

CVE.ORG link : CVE-2021-3899


JSON object : View

Products Affected

canonical

  • apport
  • ubuntu_linux
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition