CVE-2020-16120 - log back

CVE-2020-16120 edited at 14 Oct 2020 15:44:03
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Local
Type
- Unknown
+ Privilege escalation
Description
+ Giuseppe Scrivano discovered that overlayfs did not properly perform permission checking when copying up files in an overlayfs, and can be exploited from within a user namespace, if, for example, unprivileged user namespaces are allowed.
+ An attacker can abuse this to get read access to files on the system that they would not normally be permitted to access.
References
+ https://www.openwall.com/lists/oss-security/2020/10/13/6
Notes
+ Mitigation on systems where unprivileged user namespaces are enabled
+ but not needed is to set the kernel.unprivileged_userns_clone sysctl
+ to 0. e.g.:
+
+ $ sudo sysctl kernel.unprivileged_userns_clone=0
+
+ and across reboots by adding a file in /etc/sysctl.d/ that contains:
+
+ kernel.unprivileged_userns_clone=0
CVE-2020-16120 created at 14 Oct 2020 15:43:15