CVE-2021-3982

Summary

CVECVE-2021-3982
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2022-04-29 17:15:00 UTC
Updated2023-02-03 01:57:00 UTC
DescriptionLinux distributions using CAP_SYS_NICE for gnome-shell may be exposed to a privilege escalation issue. An attacker, with low privilege permissions, may take advantage of the way CAP_SYS_NICE is currently implemented and eventually load code to increase its process scheduler priority leading to possible DoS of other services running in the same machine.

Risk And Classification

Problem Types: CWE-273

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Gnome Gnome-shell - All All All

References

ReferenceSourceLinkTags
Reevaluate usage of CAP_SYS_NICE (conflicts with AT_SECURE checks) (#2284) · Issues · GNOME / gnome-shell · GitLab MISC gitlab.gnome.org
2024174 – (CVE-2021-3982) CVE-2021-3982 gnome-shell: Distributions using CAP_SYS_NICE in gnome-shell may be exposed to privilege escalation MISC bugzilla.redhat.com
New Security Issue: CAP_SYS_NICE use (#4711) · Issues · GNOME / gnome-shell · GitLab MISC gitlab.gnome.org
backends/native: Use rtkit to get realtime priority (!2060) · Merge requests · GNOME / mutter · GitLab MISC gitlab.gnome.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 282203 Fedora Security Update for gnome (FEDORA-2021-dd7960de3c)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report