First published: Tue May 05 2015(Updated: )
selinux-policy when sysctl fs.protected_hardlinks are set to 0 allows local users to cause a denial of service (SSH login prevention) by creating a hardlink to /etc/passwd from a directory named .config, and updating selinux-policy.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SELinux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3170 is classified as a moderate severity vulnerability that can cause a denial of service.
To fix CVE-2015-3170, you should update your SELinux policy to ensure proper access controls and avoid setting fs.protected_hardlinks to 0.
CVE-2015-3170 primarily affects systems using SELinux with the fs.protected_hardlinks parameter set to 0.
An attacker can create a hardlink to /etc/passwd, which may prevent SSH logins for local users.
A potential workaround for CVE-2015-3170 is to set the fs.protected_hardlinks sysctl parameter to a value other than 0.