First published: Tue May 05 2015(Updated: )
selinux-policy when sysctl fs.protected_hardlinks are set to 0 allows local users to cause a denial of service (SSH login prevention) by creating a hardlink to /etc/passwd from a directory named .config, and updating selinux-policy.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SELinux Project SELinux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.