The service daemon in CRIU does not properly restrict access to non-dumpable processes, which allows local users to obtain sensitive information via (1) process dumps or (2) ptrace access.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2015/08/25/5 | mailing list |
http://lists.opensuse.org/opensuse-updates/2015-09/msg00030.html | vendor advisory |
https://lists.openvz.org/pipermail/criu/2015-August/021847.html | mailing list vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1256728 |