Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-2640 PoC — Canonical Ubuntu Linux 安全漏洞

Source
Associated Vulnerability
Title:Canonical Ubuntu Linux 安全漏洞 (CVE-2023-2640)
Description:Canonical Ubuntu Linux是英国科能软件(Canonical)公司的一套Linux操作系统。 Canonical Ubuntu Linux存在安全漏洞,该漏洞源于内核中的OverlayFS没有执行权限检查,导致存在权限提升漏洞。
Readme
# Ubuntu Privilege Escalation: CVE-2023-2640 and CVE-2023-32629

This is a local privilege escalation vulnerability affecting certain Ubuntu kernels. It allows unprivileged users to set privileged extended attributes on mounted files, bypassing security checks and potentially gaining elevated privileges. Two CVEs, CVE-2023-2640 and CVE-2023-32629, are associated with this vulnerability. The affected kernels include versions 6.2.0, 5.19.0, and 5.4.0, across various Ubuntu releases. It's crucial to apply patches provided by Ubuntu promptly and follow security best practices to mitigate these vulnerabilities.

## Usage

1. Make the script executable:
```bash
chmod +x poc.sh
```
2. Run the script:
```bash
./poc.sh
```
## Demo

[![Demo Video](https://img.youtube.com/vi/Up5q-FLWNk4/0.jpg)](https://www.youtube.com/watch?v=Up5q-FLWNk4)
File Snapshot

[4.0K] /data/pocs/5f8ed7ec43d248a21008bb73d2b2c9fe01632db9 ├── [ 313] poc.sh └── [ 840] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.