Bug 1256728 (CVE-2015-5231) - CVE-2015-5231 criu: service daemon allows to bypass ptrace policy
Summary: CVE-2015-5231 criu: service daemon allows to bypass ptrace policy
Status: NEW
Alias: CVE-2015-5231
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=low,public=20150825,reported=2...
Keywords: Security
Depends On: 1255787 1256747
Blocks: 1255785
TreeView+ depends on / blocked
 
Reported: 2015-08-25 10:50 UTC by Florian Weimer
Modified: 2019-06-08 20:43 UTC (History)
3 users (show)

(edit)
Clone Of:
(edit)
Last Closed:


Attachments (Terms of Use)

Description Florian Weimer 2015-08-25 10:50:59 UTC
It was discovered that criu service daemon allowed local users to dump
processes as long as the user and group IDs match, disregarding other
restrictions on process dumping or ptrace access.  This failure to enforce
a configured security policy may lead to information disclosure.

Acknowledgements:

This issue was discovered by Florian Weimer of Red Hat Product Security.

Comment 3 Florian Weimer 2015-08-25 11:40:58 UTC
Created criu tracking bugs for this issue:

Affects: fedora-all [bug 1256747]

Comment 4 Florian Weimer 2015-08-25 11:59:57 UTC
Upstream discussion:

  http://lists.openvz.org/pipermail/criu/2015-August/021847.html


Note You need to log in before you can comment on or make changes to this bug.