Linux distributions using CAP_SYS_NICE for gnome-shell may be exposed to a privilege escalation issue. An attacker, with low privilege permissions, may take advantage of the way CAP_SYS_NICE is currently implemented and eventually load code to increase its process scheduler priority leading to possible DoS of other services running in the same machine.
References
Link | Resource |
---|---|
https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/2284 | Issue Tracking Patch Third Party Advisory |
https://gitlab.gnome.org/GNOME/mutter/-/merge_requests/2060 | Issue Tracking Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-04-29 17:15
Updated : 2024-02-28 19:09
NVD link : CVE-2021-3982
Mitre link : CVE-2021-3982
CVE.ORG link : CVE-2021-3982
JSON object : View
Products Affected
gnome
- gnome-shell
CWE
CWE-273
Improper Check for Dropped Privileges