CVE-2023-32629
Published on: Not Yet Published
Last Modified on: 09/11/2023 07:15:00 PM UTC
Certain versions of Ubuntu Linux from Canonical contain the following vulnerability:
Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels
- CVE-2023-32629 has been assigned by
secu[email protected] to track the vulnerability - currently rated as HIGH severity.
- Affected Vendor/Software:
Canonical - Ubuntu Kernel version not down converted
Vulnerability Patch/Work Around
- If not needed, disable the ability for unprivileged users to create namespaces. To do this temporarily, do: sudo sysctl -w kernel.unprivileged_userns_clone=0 To disable across reboots, do: echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf
CVSS3 Score: 7.8 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Kernel Live Patch Security Notice LSN-0097-1 ≈ Packet Storm | packetstormsecurity.com text/html |
![]() |
[SRU Focal 1/1] ovl: adhere to the vfs_ vs. ovl_do_ conventions for xattrs | lists.ubuntu.com text/x-diff |
![]() |
Page not found | Wiz | wiz.io text/html Inactive LinkNot Archived |
![]() |
CVE - CVE-2023-32629 | cve.mitre.org text/xml |
![]() |
USN-6250-1: Linux kernel vulnerabilities | Ubuntu security notices | Ubuntu | ubuntu.com text/html |
![]() |
Related QID Numbers
- 199608 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6250-1)
- 199610 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-6248-1)
- 199613 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6251-1)
- 199618 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6260-1)
- 199623 Ubuntu Security Notification for Linux kernel (IoT) Vulnerabilities (USN-6261-1)
- 199651 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-6285-1)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Canonical | Ubuntu Linux | 23.04 | All | All | All |
- cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
Is PopOS vulnerable to CVE-2023-2640 and CVE-2023-32629 | 2023-07-27 06:32:03 |
![]() |
GameOver(lay): Easy-to-exploit local privilege escalation vulnerabilities in Ubuntu Linux affect 40% of Ubuntu cloud workloads | 2023-07-27 15:42:28 |
![]() |
Top cybersecurity stories for the week of 07-24-23 to 07-28-23 | 2023-07-28 13:59:45 |
![]() |
Ubuntu branduolio pažeidžiamumai kelia grėsmę milijonams naudotojų | 2023-07-28 10:37:11 |
![]() |
Ubuntu Local Privilege Escalation (CVE-2023-2640 & CVE-2023-32629) | 2023-07-31 10:46:42 |
![]() |
Patch Tuesday August 2023 | 2023-08-08 17:42:04 |