There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.
Link | Tags |
---|---|
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 | issue tracking |
https://ubuntu.com/security/notices/USN-5427-1 | vendor advisory |
https://www.cve.org/CVERecord?id=CVE-2021-3899 | issue tracking |