CVE-2023-2640: Local Privilege Escalation in Ubuntu Kernel OverlayFS (GameOver(lay))
Vulnerability ID: CVE-2023-2640
CVSS Score: 7.8
Published: 2023-07-26
CVE-2023-2640 is a high-severity local privilege escalation vulnerability located in the OverlayFS implementation of specific Ubuntu Linux kernels. The flaw exists due to an unsafe interaction between an Ubuntu-specific kernel patch and an upstream kernel modification, which effectively bypasses Virtual File System (VFS) permission checks for extended attributes. An unprivileged local attacker can exploit this condition to assign root-level capabilities to arbitrary executables, achieving full system compromise.
TL;DR
A misconfiguration between Ubuntu kernel patches and upstream OverlayFS changes allows local attackers to bypass security checks and escalate to root privileges by copying files with malicious capabilities.
⚠️ Exploit Status: WEAPONIZED
Technical Details
- CWE ID: CWE-863
- Attack Vector: Local
- CVSS v3.1: 7.8
- EPSS Score: 0.91524
- Impact: Privilege Escalation (Root)
- Exploit Status: Weaponized
- CISA KEV: No
Affected Systems
- Ubuntu 23.04 (Lunar Lobster)
- Ubuntu 22.04 LTS (Jammy Jellyfish)
- Ubuntu 20.04 LTS (Focal Fossa)
-
Ubuntu 23.04 (Lunar Lobster): < 6.2.0-26.26 (Fixed in:
6.2.0-26.26) -
Ubuntu 22.04 LTS (Jammy Jellyfish): < 5.19.0-50.50 (Fixed in:
5.19.0-50.50) -
Ubuntu 20.04 LTS (Focal Fossa): < 5.4.0-155.172 (Fixed in:
5.4.0-155.172)
Exploit Details
Mitigation Strategies
- Apply vendor-provided kernel updates requiring system reboot
- Disable unprivileged user namespaces via sysctl
- Implement endpoint monitoring for suspicious namespace creation and OverlayFS mounts
Remediation Steps:
- Identify all hosts running vulnerable Ubuntu kernel branches (5.4.x, 5.19.x, 6.2.x).
- Execute standard package update procedures (e.g.,
apt-get update && apt-get upgrade linux-image-generic). - Schedule and execute mandatory system reboots to load the new kernel.
- If patching is delayed, apply the interim sysctl workaround (
echo kernel.unprivileged_userns_clone=0 | tee /etc/sysctl.d/99-disable-unpriv-userns.conf&&sysctl -p /etc/sysctl.d/99-disable-unpriv-userns.conf).
References
- Wiz Blog: GameOver(lay) Vulnerability Analysis
- Ubuntu Security Advisory (USN-6250-1)
- Ubuntu Kernel Team Mailing List - Patch Details
- CVE-2023-2640 at CVE.org
- NVD Entry for CVE-2023-2640
Read the full report for CVE-2023-2640 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)