Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2015-5231
The service daemon in CRIU does not properly restrict access to non-dumpable processes, which allows local users to obtain sensitive information via (1) process dumps or (2) ptrace access.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.001
EPSS Ranking
35.8%
CVSS Severity
CVSS v3 Score
5.5
CVSS v2 Score
2.1
References
http://lists.opensuse.org/opensuse-updates/2015-09/msg00030.html
http://www.openwall.com/lists/oss-security/2015/08/25/5
https://bugzilla.redhat.com/show_bug.cgi?id=1256728
https://lists.openvz.org/pipermail/criu/2015-August/021847.html
http://lists.opensuse.org/opensuse-updates/2015-09/msg00030.html
http://www.openwall.com/lists/oss-security/2015/08/25/5
https://bugzilla.redhat.com/show_bug.cgi?id=1256728
https://lists.openvz.org/pipermail/criu/2015-August/021847.html
Products affected by CVE-2015-5231
Criu
»
Checkpoint/restore In Userspace
»
Version:
N/A
cpe:2.3:a:criu:checkpoint/restore_in_userspace:-
Opensuse
»
Opensuse
»
Version:
13.2
cpe:2.3:o:opensuse:opensuse:13.2
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved