CVE-2015-5228

The service daemon in CRIU creates log and dump files insecurely, which allows local users to create arbitrary files and take ownership of existing files via unspecified vectors related to a directory path.
Configurations

Configuration 1 (hide)

cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:criu:checkpoint\/restore_in_userspace:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:32

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2015-09/msg00030.html - () http://lists.opensuse.org/opensuse-updates/2015-09/msg00030.html -
References () http://www.openwall.com/lists/oss-security/2015/08/25/5 - () http://www.openwall.com/lists/oss-security/2015/08/25/5 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1255782 - () https://bugzilla.redhat.com/show_bug.cgi?id=1255782 -
References () https://lists.openvz.org/pipermail/criu/2015-August/021847.html - Vendor Advisory () https://lists.openvz.org/pipermail/criu/2015-August/021847.html - Vendor Advisory

Information

Published : 2016-06-07 14:06

Updated : 2024-11-21 02:32


NVD link : CVE-2015-5228

Mitre link : CVE-2015-5228

CVE.ORG link : CVE-2015-5228


JSON object : View

Products Affected

criu

  • checkpoint\/restore_in_userspace

opensuse

  • opensuse
CWE
CWE-264

Permissions, Privileges, and Access Controls