
PEACH
Un framework di isolamento del tenant
The vulnerability (CVE-2023-46277) affects the 'please' (also known as pleaser) Rust package through version 0.5.4. The vulnerability was published on October 20, 2023, and allows for privilege escalation through the TIOCSTI and/or TIOCLINUX ioctl interfaces (Ubuntu CVE).
The vulnerability has been assigned a CVSS 3.1 score of 7.8 (High). The attack vector is Local, with low attack complexity and low privileges required. The vulnerability requires no user interaction and has an unchanged scope. The vulnerability impacts confidentiality, integrity, and availability, all rated as High. The complete CVSS vector string is CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (Ubuntu CVE).
The vulnerability allows for local privilege escalation, which could lead to unauthorized elevation of privileges on affected systems. The impact ratings indicate high potential for compromise of system confidentiality, integrity, and availability (Ubuntu CVE).
The vulnerability affects multiple Ubuntu releases including 25.04 (plucky), 24.04 LTS (noble), and 22.04 LTS (jammy), which are currently marked as 'Needs evaluation'. Several older releases have been marked as 'Ignored end of life' or 'Not in release' (Ubuntu CVE).
Fonte: Questo report è stato generato utilizzando l'intelligenza artificiale
Valutazione gratuita delle vulnerabilità
Valuta le tue pratiche di sicurezza cloud in 9 domini di sicurezza per confrontare il tuo livello di rischio e identificare le lacune nelle tue difese.
Richiedi una demo personalizzata
"La migliore esperienza utente che abbia mai visto offre piena visibilità ai carichi di lavoro cloud."
"Wiz fornisce un unico pannello di controllo per vedere cosa sta succedendo nei nostri ambienti cloud."
"Sappiamo che se Wiz identifica qualcosa come critico, in realtà lo è."