CVE-2021-3982
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Linux distributions using CAP_SYS_NICE for gnome-shell may be exposed to a privilege escalation issue. An attacker, with low privilege permissions, may take advantage of the way CAP_SYS_NICE is currently implemented and eventually load code to increase its process scheduler priority leading to possible DoS of other services running in the same machine.
Las distribuciones de Linux que usan la función CAP_SYS_NICE para gnome-shell pueden estar expuestas a un problema de escalada de privilegios. Un atacante, con permisos de bajo privilegio, puede aprovechar la forma en que CAP_SYS_NICE está actualmente implementado y eventualmente cargar código para aumentar su prioridad de programación de procesos conllevando a un posible DoS de otros servicios que son ejecutados en la misma máquina
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-11-19 CVE Reserved
- 2022-04-29 CVE Published
- 2023-11-20 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-273: Improper Check for Dropped Privileges
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/2284 | 2023-02-03 | |
https://gitlab.gnome.org/GNOME/mutter/-/merge_requests/2060 | 2023-02-03 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gnome Search vendor "Gnome" | Gnome-shell Search vendor "Gnome" for product "Gnome-shell" | - | - |
Affected
|