cve/2023/CVE-2023-2640.md

54 lines
2.6 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-2640](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2640)
![](https://img.shields.io/static/v1?label=Product&message=Ubuntu%20Kernel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-863&color=brighgreen)
### Description
On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xWhoami35/root-kernel
- https://github.com/0xsyr0/OSCP
- https://github.com/Ev3rPalestine/Analytics-HTB-Walkthrough
2024-06-22 09:37:59 +00:00
- https://github.com/HaxorSecInfec/autoroot.sh
2024-06-10 07:22:43 +00:00
- https://github.com/K5LK/CVE-2023-2640-32629
2024-05-25 21:48:12 +02:00
- https://github.com/Kiosec/Linux-Exploitation
2024-05-28 08:49:17 +00:00
- https://github.com/Nkipohcs/CVE-2023-2640-CVE-2023-32629
2024-05-25 21:48:12 +02:00
- https://github.com/OllaPapito/gameoverlay
2024-05-28 08:49:17 +00:00
- https://github.com/PuguhDy/CVE-Root-Ubuntu
- https://github.com/SanjayRagavendar/Ubuntu-GameOver-Lay
2024-05-25 21:48:12 +02:00
- https://github.com/SanjayRagavendar/UbuntuPrivilegeEscalationV1
- https://github.com/SirElmard/ethical_hacking
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ThrynSec/CVE-2023-32629-CVE-2023-2640---POC-Escalation
- https://github.com/Umutkgz/CVE-2023-32629-CVE-2023-2640-Ubuntu-Privilege-Escalation-POC
- https://github.com/brimstone/stars
2024-05-28 08:49:17 +00:00
- https://github.com/churamanib/p0wny-shell
2024-05-25 21:48:12 +02:00
- https://github.com/cyberexpertsng/Cyber-Advisory
- https://github.com/druxter-x/PHP-CVE-2023-2023-2640-POC-Escalation
- https://github.com/g1vi/CVE-2023-2640-CVE-2023-32629
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/ilviborici/ubuntu-privesc
- https://github.com/johnlettman/juju-patch-gameoverlay
- https://github.com/johnlettman/juju-scripts
- https://github.com/k4but0/Ubuntu-LPE
- https://github.com/kaotickj/Check-for-CVE-2023-32629-GameOver-lay
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/luanoliveira350/GameOverlayFS
2024-05-28 08:49:17 +00:00
- https://github.com/musorblyat/CVE-2023-2640-CVE-2023-32629
2024-05-25 21:48:12 +02:00
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oscpname/OSCP_cheat
- https://github.com/revanmalang/OSCP
- https://github.com/txuswashere/OSCP
- https://github.com/vinetsuicide/CVE-2023-2640-CVE-2023-32629
2024-05-28 08:49:17 +00:00
- https://github.com/xS9NTX/CVE-2023-32629-CVE-2023-2640-Ubuntu-Privilege-Escalation-POC
2024-05-25 21:48:12 +02:00
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xhref/OSCP