Vulnerability CVE-2015-5231


Published: 2016-06-07

Description:
The service daemon in CRIU does not properly restrict access to non-dumpable processes, which allows local users to obtain sensitive information via (1) process dumps or (2) ptrace access.

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Opensuse -> Opensuse 
Novell -> Opensuse 
CRIU -> CRIU 
CRIU -> Checkpoint/restore in userspace 

 References:
http://lists.opensuse.org/opensuse-updates/2015-09/msg00030.html
http://www.openwall.com/lists/oss-security/2015/08/25/5
https://bugzilla.redhat.com/show_bug.cgi?id=1256728
https://lists.openvz.org/pipermail/criu/2015-August/021847.html

Copyright 2024, cxsecurity.com

 

Back to Top