Security Bulletin
Summary
PowerKVM is affected by a vulnerability in policycoreutils. IBM has now addressed this vulnerability.
Vulnerability Details
CVEID: CVE-2018-1063
DESCRIPTION: Policycoreutils could allow a local authenticated attacker to launch a symlink attack. Context relabeling of filesystems creates temporary files insecurely. A local attacker could exploit this vulnerability by creating a symbolic link from a temporary file to various files on the system, which could allow the attacker to overwrite arbitrary files on the system with elevated privileges.
CVSS Base Score: 3.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/139845 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
Affected Products and Versions
PowerKVM v3.1
Remediation/Fixes
Customers can update PowerKVM systems by using "yum update".
Fix images are made available via Fix Central. See https://ibm.biz/BdHggw. This issue is addressed starting with v3.1.0.2 update 15.
Workarounds and Mitigations
none
Get Notified about Future Security Bulletins
References
Change History
20 August 2018 - Initial Version
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
26 September 2018
UID
ibm10728473