5.5
CVSSv3

CVE-2015-5231

Published: 07/06/2016 Updated: 30/10/2018
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The service daemon in CRIU does not properly restrict access to non-dumpable processes, which allows local users to obtain sensitive information via (1) process dumps or (2) ptrace access.

Vulnerable Product Search on Vulmon Subscribe to Product

criu checkpoint\\/restore in userspace -

opensuse opensuse 13.2

Vendor Advisories

Debian Bug report logs - #797110 criu: CVE-2015-5231: service daemon allows to bypass ptrace policy Package: src:criu; Maintainer for src:criu is Salvatore Bonaccorso <carnil@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 27 Aug 2015 20:39:02 UTC Severity: normal Tags: security, upstrea ...
The service daemon in CRIU does not properly restrict access to non-dumpable processes, which allows local users to obtain sensitive information via (1) process dumps or (2) ptrace access ...