Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-3982

Опубликовано: 29 апр. 2022
Источник: ubuntu
Приоритет: medium
CVSS2: 2.1
CVSS3: 5.5

Описание

Linux distributions using CAP_SYS_NICE for gnome-shell may be exposed to a privilege escalation issue. An attacker, with low privilege permissions, may take advantage of the way CAP_SYS_NICE is currently implemented and eventually load code to increase its process scheduler priority leading to possible DoS of other services running in the same machine.

РелизСтатусПримечание
bionic

not-affected

3.28.4-0ubuntu18.04.7
devel

not-affected

40.5-1ubuntu2
esm-apps/xenial

needed

esm-infra/bionic

not-affected

3.28.4-0ubuntu18.04.7
esm-infra/focal

not-affected

3.36.9-0ubuntu0.20.04.2
focal

not-affected

3.36.9-0ubuntu0.20.04.2
hirsute

not-affected

3.38.4-1ubuntu3~21.04.1
impish

not-affected

40.5-1ubuntu2
jammy

not-affected

40.5-1ubuntu2
kinetic

not-affected

40.5-1ubuntu2

Показывать по

Ссылки на источники

2.1 Low

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
redhat
около 4 лет назад

Linux distributions using CAP_SYS_NICE for gnome-shell may be exposed to a privilege escalation issue. An attacker, with low privilege permissions, may take advantage of the way CAP_SYS_NICE is currently implemented and eventually load code to increase its process scheduler priority leading to possible DoS of other services running in the same machine.

CVSS3: 5.5
nvd
почти 4 года назад

Linux distributions using CAP_SYS_NICE for gnome-shell may be exposed to a privilege escalation issue. An attacker, with low privilege permissions, may take advantage of the way CAP_SYS_NICE is currently implemented and eventually load code to increase its process scheduler priority leading to possible DoS of other services running in the same machine.

CVSS3: 5.5
debian
почти 4 года назад

Linux distributions using CAP_SYS_NICE for gnome-shell may be exposed ...

CVSS3: 5.5
github
почти 4 года назад

Linux distributions using CAP_SYS_NICE for gnome-shell may be exposed to a privilege escalation issue. An attacker, with low privilege permissions, may take advantage of the way CAP_SYS_NICE is currently implemented and eventually load code to increase its process scheduler priority leading to possible DoS of other services running in the same machine.

2.1 Low

CVSS2

5.5 Medium

CVSS3