CVE-2015-5228

Impact:
Moderate
Public Date:
2015-08-25
Bugzilla:
1255782: CVE-2015-5228 criu: arbitrary file creation and chown

The MITRE CVE dictionary describes this issue as:

The service daemon in CRIU creates log and dump files insecurely, which allows local users to create arbitrary files and take ownership of existing files via unspecified vectors related to a directory path.

Find out more about CVE-2015-5228 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 6.6
Base Metrics AV:L/AC:L/Au:N/C:C/I:C/A:N
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 criu Will not fix
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.

Acknowledgements

This issue was discovered by Florian Weimer of Red Hat Product Security.
Last Modified

CVE description copyright © 2017, The MITRE Corporation