First published: Tue Oct 13 2020(Updated: )
Last updated 29 November 2024
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <5.11 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =20.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 |
disable unprivileged user namespaces if not needed via sudo sysctl kernel.unprivileged_userns_clone=0 do this permanently by adding kernel.unprivileged_userns_clone = 0 to /etc/sysctl.d/99-userns.conf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-16120 has a severity rating that enables potential privilege escalation in systems using vulnerable versions of Overlayfs.
To fix CVE-2020-16120, update to the patched versions of Linux kernels: 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, or 6.12.10-1.
CVE-2020-16120 affects multiple Linux distributions including Debian and various versions of Ubuntu.
Yes, CVE-2020-16120 can be exploited from within a user namespace if unprivileged user namespaces are allowed.
Overlayfs is a layered filesystem in Linux that is implicated in the permission-checking flaw described in CVE-2020-16120.