First published: Mon Jan 29 2018(Updated: )
systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Systemd Project Systemd | <237 | |
Debian Debian Linux | =8.0 | |
openSUSE Leap | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18078 is a vulnerability in systemd-tmpfiles in systemd before version 237 that allows local users to bypass access restrictions and escalate privileges.
CVE-2017-18078 has a severity score of 7.8, which is considered high.
Systemd version up to 237, Debian Linux version 8.0, and openSUSE Leap version 42.3 are affected by CVE-2017-18078.
CVE-2017-18078 allows local users to bypass access restrictions by exploiting ownership/permission changes on hardlinked files.
Yes, you can find more information about CVE-2017-18078 at the following links: http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html, http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html, http://www.openwall.com/lists/oss-security/2018/01/29/3.