7.8 CVE-2023-32629
Patch Exploit
Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels
https://nvd.nist.gov/vuln/detail/CVE-2023-32629
Categories
CWE-863
References
af854a3a-2127-422b-91ae-364da2661108 Patch Exploit
security@ubuntu.com Patch Exploit
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:* |
REMEDIATION
Patch
Url |
---|
https://lists.ubuntu.com/archives/kernel-team/2023-July/140920.html |
https://lists.ubuntu.com/archives/kernel-team/2023-July/140920.html |
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
Other Nist (github, ...)
Url |
---|
https://wiz.io/blog/ubuntu-overlayfs-vulnerability |
https://wiz.io/blog/ubuntu-overlayfs-vulnerability |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.