PowerKVM is affected by a vulnerability in policycoreutils. IBM has now addressed this vulnerability.
CVEID: CVE-2018-1063 DESCRIPTION: Policycoreutils could allow a local authenticated attacker to launch a symlink attack. Context relabeling of filesystems creates temporary files insecurely. A local attacker could exploit this vulnerability by creating a symbolic link from a temporary file to various files on the system, which could allow the attacker to overwrite arbitrary files on the system with elevated privileges.
CVSS Base Score: 3.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/139845> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
PowerKVM v3.1
Customers can update PowerKVM systems by using “yum update”.
Fix images are made available via Fix Central. See <https://ibm.biz/BdHggw>. This issue is addressed starting with v3.1.0.2 update 15.
none