selinux-policy when sysctl fs.protected_hardlinks are set to 0 allows local users to cause a denial of service (SSH login prevention) by creating a hardlink to /etc/passwd from a directory named .config, and updating selinux-policy.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=1218672 | Issue Tracking | 
| https://bugzilla.redhat.com/show_bug.cgi?id=1218672 | Issue Tracking | 
Configurations
                    History
                    21 Nov 2024, 02:28
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=1218672 - Issue Tracking | 
Information
                Published : 2017-07-21 14:29
Updated : 2025-04-20 01:37
NVD link : CVE-2015-3170
Mitre link : CVE-2015-3170
CVE.ORG link : CVE-2015-3170
JSON object : View
Products Affected
                selinux_project
- selinux
CWE
                
                    
                        
                        CWE-254
                        
            7PK - Security Features
