A Linux Kernel privilege escalation vulnerability affects PowerKVM.
CVEID: CVE-2016-0728**
DESCRIPTION:** Linux Kernel could allow a local attacker to gain elevated privileges on the system, caused by a use-after-free in the join_session_keyring() function in security/keys/process_keys.c. By overflowing the usage field, an attacker could exploit this vulnerability to execute arbitrary code on the system with kernel-level privileges.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109695 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
PowerKVM 2.1 and PowerKVM 3.1
Fix is made available via Fix Central (https://ibm.biz/BdEnT8) for v2.1 in 2.1.1 Build 65.5 and all later 2.1.1 SP3 service builds and 2.1.1 fix packs. For version 3.1, see https://ibm.biz/BdHggw for 3.1 service build 2 or later.
For systems currently running fix levels of PowerKVM prior to 2.1.1, please see <http://download4.boulder.ibm.com/sar/CMA/OSA/05e4c/0/README> for prerequisite fixes and instructions. Customers can also update from 2.1.1 (GA and later levels) by using โyum updateโ.
None