CVE-2021-3899

EUVD-2021-27131
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
TOCTOU
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 86%
Affected Products (NVD)
VendorProductVersion
apportapport
𝑥
< 2.21.0
canonicalapport
𝑥
< 2.21.0
canonicalubuntu_linux
18.04
canonicalubuntu_linux
20.04
canonicalubuntu_linux
21.10
canonicalubuntu_linux
22.04
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
apport
bionic
Fixed 2.20.9-0ubuntu7.28
released
focal
Fixed 2.20.11-0ubuntu27.24
released
hirsute
ignored
impish
Fixed 2.20.11-0ubuntu71.2
released
jammy
Fixed 2.20.11-0ubuntu82.1
released
kinetic
Fixed 2.21.0-0ubuntu1
released
lunar
Fixed 2.21.0-0ubuntu1
released
mantic
Fixed 2.21.0-0ubuntu1
released
noble
Fixed 2.21.0-0ubuntu1
released
trusty
needed
xenial
Fixed 2.20.1-0ubuntu2.30+esm4
released