Upstream information

CVE-2015-5231 at MITRE


The service daemon in CRIU does not properly restrict access to non-dumpable processes, which allows local users to obtain sensitive information via (1) process dumps or (2) ptrace access.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 2.1
Vector AV:L/AC:L/Au:N/C:P/I:N/A:N
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
SUSE Bugzilla entry: 943105 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • criu >= 2.9-1.1
  • criu-devel >= 2.9-1.1
  • libcriu1 >= 2.9-1.1
openSUSE Tumbleweed GA criu-2.9-1.1

SUSE Timeline for this CVE

CVE page created: Tue Aug 25 14:15:44 2015
CVE page last modified: Fri Oct 7 12:47:14 2022