Upstream information

CVE-2015-5231 at MITRE

Description

The service daemon in CRIU does not properly restrict access to non-dumpable processes, which allows local users to obtain sensitive information via (1) process dumps or (2) ptrace access.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 2.1
Vector AV:L/AC:L/Au:N/C:P/I:N/A:N
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
SUSE Bugzilla entry: 943105 [RESOLVED / FIXED]

SUSE Security Advisories:

    openSUSE-SU-2015:1593-1

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • criu >= 2.9-1.1
  • criu-devel >= 2.9-1.1
  • libcriu1 >= 2.9-1.1
Patchnames:
openSUSE-Tumbleweed-2024-10278


SUSE Timeline for this CVE

CVE page created: Tue Aug 25 14:15:44 2015
CVE page last modified: Sat Jun 15 22:40:36 2024