Description
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
References
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376
Issue TrackingPatch
https://ubuntu.com/security/notices/USN-5427-1
Vendor Advisory
https://www.cve.org/CVERecord?id=CVE-2021-3899
Third Party Advisory
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376
Issue TrackingPatch
https://ubuntu.com/security/notices/USN-5427-1
Vendor Advisory
https://www.cve.org/CVERecord?id=CVE-2021-3899
Third Party Advisory
Weaknesses
134c704f-9b21-4f2e-91b3-4a467353bcc0
Secondary
CWE-367
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 · High
Information
Source identifier
Vulnerability status
Analyzed
Published
2024-06-03T17:15:08.940Z
1 year agoLast modified
2025-08-26T15:21:04.500Z
7 months ago