CVE-2021-3899

There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
Configurations

Configuration 1 (hide)

cpe:2.3:a:canonical:apport:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*

History

No history.

Information

Published : 2024-06-03 19:15

Updated : 2025-08-26 17:21


NVD link : CVE-2021-3899

Mitre link : CVE-2021-3899

CVE.ORG link : CVE-2021-3899


JSON object : View

Products Affected

canonical

  • ubuntu_linux
  • apport
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition