CVE-2021-3899

There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
TOCTOU
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
canonicalCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 66%
VendorProductVersion
apportapport
𝑥
< 2.21.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
apport
noble
Fixed 2.21.0-0ubuntu1
released
mantic
Fixed 2.21.0-0ubuntu1
released
lunar
Fixed 2.21.0-0ubuntu1
released
kinetic
Fixed 2.21.0-0ubuntu1
released
jammy
Fixed 2.20.11-0ubuntu82.1
released
impish
Fixed 2.20.11-0ubuntu71.2
released
hirsute
ignored
focal
Fixed 2.20.11-0ubuntu27.24
released
bionic
Fixed 2.20.9-0ubuntu7.28
released
xenial
Fixed 2.20.1-0ubuntu2.30+esm4
released
trusty
needed