USN-4712-1: Linux kernel regression

Publication date

2 February 2021

Overview

USN-4576-1 introduced a regression in the Linux kernel.


Packages

Details

USN-4576-1 fixed a vulnerability in the overlay file system
implementation in the Linux kernel. Unfortunately, that fix introduced
a regression that could incorrectly deny access to overlay files in
some situations. This update fixes the problem.

We apologize for the inconvenience.

Original vulnerability details:

Giuseppe Scrivano discovered that the overlay file system in the Linux
kernel did not properly perform permission checks in some situations. A
local attacker could possibly use this to bypass intended restrictions and
gain read access to restricted files.

USN-4576-1 fixed a vulnerability in the overlay file system
implementation in the Linux kernel. Unfortunately, that fix introduced
a regression that could incorrectly deny access to overlay files in
some situations. This update fixes the problem.

We apologize for the inconvenience.

Original vulnerability details:

Giuseppe Scrivano discovered that the overlay file system in the Linux
kernel did not properly perform permission checks in some situations. A
local attacker could possibly use this to bypass intended restrictions and
gain read access to restricted files.

Update instructions

After a standard system update you need to reboot your computer to make all the necessary changes.

Learn more about how to get the fixes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
20.10 groovy linux-image-5.8.0-41-generic –  5.8.0-41.46
linux-image-5.8.0-41-generic-64k –  5.8.0-41.46
linux-image-5.8.0-41-generic-lpae –  5.8.0-41.46
linux-image-5.8.0-41-lowlatency –  5.8.0-41.46
linux-image-generic –  5.8.0.41.45
linux-image-generic-64k –  5.8.0.41.45
linux-image-generic-lpae –  5.8.0.41.45
linux-image-lowlatency –  5.8.0.41.45
linux-image-oem-20.04 –  5.8.0.41.45
linux-image-virtual –  5.8.0.41.45
20.04 focal linux-image-5.4.0-65-generic –  5.4.0-65.73
linux-image-5.4.0-65-generic-lpae –  5.4.0-65.73
linux-image-5.4.0-65-lowlatency –  5.4.0-65.73
linux-image-5.8.0-41-generic –  5.8.0-41.46~20.04.1
linux-image-5.8.0-41-generic-lpae –  5.8.0-41.46~20.04.1
linux-image-5.8.0-41-lowlatency –  5.8.0-41.46~20.04.1
linux-image-generic –  5.4.0.65.68
linux-image-generic-64k-hwe-20.04 –  5.8.0.41.46~20.04.27
linux-image-generic-hwe-20.04 –  5.8.0.41.46~20.04.27
linux-image-generic-lpae –  5.4.0.65.68
linux-image-generic-lpae-hwe-20.04 –  5.8.0.41.46~20.04.27
linux-image-lowlatency –  5.4.0.65.68
linux-image-lowlatency-hwe-20.04 –  5.8.0.41.46~20.04.27
linux-image-oem –  5.4.0.65.68
linux-image-oem-osp1 –  5.4.0.65.68
linux-image-virtual –  5.4.0.65.68
linux-image-virtual-hwe-20.04 –  5.8.0.41.46~20.04.27
18.04 bionic linux-image-5.4.0-65-generic –  5.4.0-65.73~18.04.1
linux-image-5.4.0-65-generic-lpae –  5.4.0-65.73~18.04.1
linux-image-5.4.0-65-lowlatency –  5.4.0-65.73~18.04.1
linux-image-generic-hwe-18.04 –  5.4.0.65.73~18.04.60
linux-image-generic-lpae-hwe-18.04 –  5.4.0.65.73~18.04.60
linux-image-lowlatency-hwe-18.04 –  5.4.0.65.73~18.04.60
linux-image-oem –  5.4.0.65.73~18.04.60
linux-image-oem-osp1 –  5.4.0.65.73~18.04.60
linux-image-snapdragon-hwe-18.04 –  5.4.0.65.73~18.04.60
linux-image-virtual-hwe-18.04 –  5.4.0.65.73~18.04.60

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›