Update and rename CVE-2023-32629.yaml to CVE-2023-2640.yaml
parent
a97ab5cd92
commit
909440d0d9
|
@ -1,4 +1,4 @@
|
||||||
id: CVE-2023-32629
|
id: CVE-2023-2640
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: GameOver(lay) - Local Privilege Escalation in Ubuntu Kernel
|
name: GameOver(lay) - Local Privilege Escalation in Ubuntu Kernel
|
||||||
|
@ -6,26 +6,30 @@ info:
|
||||||
severity: high
|
severity: high
|
||||||
description: |
|
description: |
|
||||||
A local privilege escalation vulnerability has been discovered in the OverlayFS module of the Ubuntu kernel. This vulnerability could allow an attacker with local access to escalate their privileges, potentially gaining root-like access to the system.
|
A local privilege escalation vulnerability has been discovered in the OverlayFS module of the Ubuntu kernel. This vulnerability could allow an attacker with local access to escalate their privileges, potentially gaining root-like access to the system.
|
||||||
reference:
|
impact: |
|
||||||
- http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
An attacker with local access can gain elevated privileges on the affected system.
|
||||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32629
|
|
||||||
- https://lists.ubuntu.com/archives/kernel-team/2023-July/140920.html
|
|
||||||
- https://ubuntu.com/security/notices/USN-6250-1
|
|
||||||
remediation: |
|
remediation: |
|
||||||
Apply the latest security patches and updates provided by Ubuntu to fix the vulnerability.
|
Apply the latest security patches and updates provided by Ubuntu to fix the vulnerability.
|
||||||
|
reference:
|
||||||
|
- http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
||||||
|
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2640
|
||||||
|
- https://www.wiz.io/blog/ubuntu-overlayfs-vulnerability
|
||||||
|
- https://ubuntu.com/security/notices/USN-6250-1
|
||||||
|
- https://lists.ubuntu.com/archives/kernel-team/2023-July/140923.html
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
||||||
cvss-score: 7.8
|
cvss-score: 7.8
|
||||||
cve-id: CVE-2023-32629
|
cve-id: CVE-2023-2640
|
||||||
cwe-id: CWE-863
|
cwe-id: CWE-863
|
||||||
|
epss-score: 0.00047
|
||||||
|
epss-percentile: 0.14754
|
||||||
cpe: cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:*
|
cpe: cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:*
|
||||||
epss-score: 0.00042
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
|
||||||
product: ubuntu_linux
|
|
||||||
vendor: canonical
|
|
||||||
verified: true
|
verified: true
|
||||||
tags: cve,cve2023,kernel,ubuntu,linux,privesc,local
|
max-request: 2
|
||||||
|
vendor: canonical
|
||||||
|
product: ubuntu_linux
|
||||||
|
tags: packetstorm,cve,cve2023,kernel,ubuntu,linux,privesc,local
|
||||||
|
|
||||||
self-contained: true
|
self-contained: true
|
||||||
code:
|
code:
|
||||||
|
@ -50,4 +54,3 @@ code:
|
||||||
- '!contains(code_1_response, "(root)")'
|
- '!contains(code_1_response, "(root)")'
|
||||||
- 'contains(code_2_response, "(root)")'
|
- 'contains(code_2_response, "(root)")'
|
||||||
condition: and
|
condition: and
|
||||||
# digest: 4a0a00473045022100cc36ed65fa01fe534699e2db622f418a3bb9470edd14eca1eba3138a2daebd4802207b1222e3e2dd3f5701821bab6d24e5cb9976223561e411372df8a2be3a71253c:922c64590222798bb761d5b6d8e72950
|
|
Loading…
Reference in New Issue