Description
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
References
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376
Issue TrackingPatch
https://ubuntu.com/security/notices/USN-5427-1
Vendor Advisory
https://www.cve.org/CVERecord?id=CVE-2021-3899
Third Party Advisory
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376
Issue TrackingPatch
https://ubuntu.com/security/notices/USN-5427-1
Vendor Advisory
https://www.cve.org/CVERecord?id=CVE-2021-3899
Third Party Advisory
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2024-06-03T19:15:08.940
1 year agoLast modified
2025-08-26T17:21:04.500
4 months ago