{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-2640","assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","state":"PUBLISHED","assignerShortName":"canonical","dateReserved":"2023-05-10T21:23:35.226Z","datePublished":"2023-07-26T01:59:23.543Z","dateUpdated":"2024-10-23T14:59:17.779Z"},"containers":{"cna":{"affected":[{"vendor":"Canonical","product":"Ubuntu Kernel","platforms":["Linux"],"packageName":"Linux","versions":[{"status":"unaffected","version":"0","lessThan":"6.2.0-26.26","versionType":"semver"},{"status":"unaffected","version":"0","lessThan":"6.0.0-1020.20","versionType":"semver"},{"status":"unaffected","version":"0","lessThan":"5.4.0-155.172","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"On Ubuntu kernels carrying both c914c0e27eb0 and \"UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs\", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks."}],"workarounds":[{"lang":"en","value":"If not needed, disable the ability for unprivileged users\nto create namespaces. To do this temporarily, do:\n  sudo sysctl -w kernel.unprivileged_userns_clone=0\nTo disable across reboots, do:\n  echo kernel.unprivileged_userns_clone=0 | \\\n  sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf"}],"datePublic":"2023-06-06T00:00:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-863","description":"CWE-863","lang":"en","type":"CWE"}]}],"references":[{"tags":["vendor-advisory"],"url":"https://ubuntu.com/security/notices/USN-6250-1"},{"tags":["issue-tracking"],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2640"},{"tags":["technical-description"],"url":"https://wiz.io/blog/ubuntu-overlayfs-vulnerability"},{"tags":["mailing-list"],"url":"https://lists.ubuntu.com/archives/kernel-team/2023-July/140923.html"}],"credits":[{"lang":"en","type":"finder","value":"Stonejiajia"},{"lang":"en","type":"finder","value":"Shir Tamari"},{"lang":"en","type":"finder","value":"Sagi Tzadik"}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH"}}],"providerMetadata":{"orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical","dateUpdated":"2023-07-26T01:59:23.543Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:26:09.894Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://ubuntu.com/security/notices/USN-6250-1"},{"tags":["issue-tracking","x_transferred"],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2640"},{"tags":["technical-description","x_transferred"],"url":"https://wiz.io/blog/ubuntu-overlayfs-vulnerability"},{"tags":["mailing-list","x_transferred"],"url":"https://lists.ubuntu.com/archives/kernel-team/2023-July/140923.html"}]},{"affected":[{"vendor":"canonical","product":"ubantu_kernel","cpes":["cpe:2.3:o:canonical:ubantu_kernel:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"6.2.0-26.26","versionType":"semver"},{"version":"0","status":"affected","lessThan":"6.0.0-1020.20","versionType":"semver"},{"version":"0","status":"affected","lessThan":"5.4.0-155.172","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-23T14:57:20.015297Z","id":"CVE-2023-2640","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-23T14:59:17.779Z"}}]}}