{"id":52983,"date":"2023-07-27T13:50:02","date_gmt":"2023-07-27T13:50:02","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34838\/Two-New-Vulnerabilities-Could-Affect-40-Of-Ubuntu-Cloud-Workloads.html"},"modified":"2023-07-27T13:50:02","modified_gmt":"2023-07-27T13:50:02","slug":"two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/","title":{"rendered":"Two New Vulnerabilities Could Affect 40% Of Ubuntu Cloud Workloads"},"content":{"rendered":"<p><strong>Researchers at cloud security firm Wiz have discovered two easily exploitable privilege escalation vulnerabilities in Ubuntu\u2019s OverlayFS module affecting 40% of Ubuntu cloud workloads.<\/strong>\n<\/p>\n<p>OverlayFS is a union filesystem that allows one filesystem to overlay another, enabling file modifications without changing the base. It allows users to copy files from the base to the upper layer and perform operations and maintain metadata that should not be possible in Linux.&nbsp;\n<\/p>\n<p>The Wiz researchers discovered a flaw in the Ubuntu-specific OverlayFS module that allows specialized executables to escalate privileges to \u2018root\u2019 on the affected machine. It is possible to trick the Ubuntu Kernel into copying this file to a different location, giving anyone who executes it root-like privileges. Wiz found two vulnerabilities which, together, the firm describes as GameOver(lay).\n<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/07\/GameOverlay-Ubuntu-Vulnerability-1024x555.png\" alt class=\"wp-image-34475\" width=\"768\" height=\"416\" srcset=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/07\/GameOverlay-Ubuntu-Vulnerability-1024x555.png 1024w, https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/07\/GameOverlay-Ubuntu-Vulnerability-360x195.png 360w, https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/07\/GameOverlay-Ubuntu-Vulnerability-768x416.png 768w, https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/07\/GameOverlay-Ubuntu-Vulnerability.png 1206w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\"><\/figure>\n<\/div>\n<p>The flaw is similar in operation to a Linux Kernel vulnerability (<a href=\"https:\/\/www.securityweek.com\/cisa-tells-organizations-patch-linux-kernel-vulnerability-exploited-malware\/\">CVE-2021-3493<\/a>) discovered in 2021. However, Ubuntu had earlier modified its own kernel in 2018 in a manner that allowed subsequent mitigations to the General kernel to not fully remove the basic flaw from Ubuntu\u2019s OverlayFS module.\n<\/p>\n<p>\u201cSubtle changes in the Linux kernel introduced by Ubuntu many years ago have unforeseen implications,\u201d explains Ami Luttwak, co-founder and CTO at Wiz. \u201cWe found two privilege escalation vulnerabilities caused by these changes and who knows how many other vulnerabilities are still lurking in the shadows of the Linux kernel spaghetti?\u201d\n<\/p>\n<p>The Wiz researchers <a href=\"https:\/\/www.wiz.io\/blog\/ubuntu-overlayfs-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">discovered<\/a> two vulnerabilities in the Ubuntu OverlayFS module: <strong>CVE-2023-2640<\/strong> and <strong>CVE-2023-32629 <\/strong>(together dubbed \u2018GameOver(lay)\u2019).\n<\/p>\n<p>CVE-2023-2640 is enabled because the Ubuntu OverlayFS module does not convert file security capabilities before files are copied. As a result, an unprivileged user can create a new directory structure and enter a new user namespace with administrative-like capabilities. They can then mount and OverlayFS mount, ultimately creating a file with capabilities applicable to the init user namespace and effectively escalating the user\u2019s privileges to root.&nbsp;\n<\/p>\n<p>\u201cSuccessful exploitation of CVE-2023-2640,\u201d say the researchers, \u201ctherefore results in the generation of a \u2018capable\u2019 file in the `upperdir` directory that grants root-equivalent capabilities to anyone who executes it.\u201d<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Advertisement. Scroll to continue reading.<\/span><\/div>\n<p>CVE-2023-32629 is similar to CVE-2023-2640, but affects slightly different kernel versions, and exploitation results from a different code flow. The result is the same: \u201cThe file has capabilities that are applicable to the init user namespace,\u201d say the researchers, \u201cwhich effectively escalates the user\u2019s privileges to root.\u201d\n<\/p>\n<p>These are not the first vulnerabilities found within OverlayFS. Earlier examples include CVE-2016-1576, CVE-2021-3847, CVE-2021-3493, and CVE-2023-0386. The Wiz researchers note that CVE-2021-3493 is so similar to one of the GameOver(lay) vulnerabilities that \u201cits publicly available PoC can currently be used to exploit that vulnerability as is.\u201d\n<\/p>\n<p>Ubuntu fixed the vulnerabilities on July 24, 2023, and users are urged to update their kernels.\n<\/p>\n<p>New York-based Wiz was founded in January 2020 by Ami Luttwak (CTO), Assaf Rappaport (CEO), Roy Reznik (VP R&amp;D), and Yinon Costica (VP of product). Its latest funding round (Series D, February 2023) raised <a href=\"https:\/\/www.securityweek.com\/cloud-security-firm-wiz-raises-300-million-at-10-billion-valuation\/\">$300 million<\/a>, bringing the total raised to date to $900 million and valuing the company at $10 billion.\n<\/p>\n<p><strong>Related<\/strong>: <a href=\"https:\/\/www.securityweek.com\/wiz-says-62-of-aws-environments-exposed-to-zenbleed-exploitation\/\">Wiz Says 62% of AWS Environments Exposed to Zenbleed Exploitation<\/a>\n<\/p>\n<p><strong>Related<\/strong>: <a href=\"https:\/\/www.securityweek.com\/orca-sues-wiz-over-alleged-cloud-security-patent-violations\/\">Orca Sues Wiz Over Alleged Cloud Security Patent Violations<\/a>\n<\/p>\n<p><strong>Related<\/strong>: <a href=\"https:\/\/www.securityweek.com\/cisa-tells-organizations-patch-linux-kernel-vulnerability-exploited-malware\/\">CISA Tells Organizations to Patch Linux Kernel Vulnerability Exploited by Malware<\/a>\n<\/p>\n<p><strong>Related<\/strong>: <a href=\"https:\/\/www.securityweek.com\/canonical-patches-privilege-escalation-vulnerability-ubuntu\/\">Canonical Patches Privilege Escalation Vulnerability in Ubuntu<\/a>\n<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34838\/Two-New-Vulnerabilities-Could-Affect-40-Of-Ubuntu-Cloud-Workloads.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":52984,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[3707],"class_list":["post-52983","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinelinuxflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Two New Vulnerabilities Could Affect 40% Of Ubuntu Cloud Workloads 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Two New Vulnerabilities Could Affect 40% Of Ubuntu Cloud Workloads 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-27T13:50:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/07\/GameOverlay-Ubuntu-Vulnerability-1024x555.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Two New Vulnerabilities Could Affect 40% Of Ubuntu Cloud Workloads\",\"datePublished\":\"2023-07-27T13:50:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\\\/\"},\"wordCount\":569,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads.png\",\"keywords\":[\"headline,linux,flaw\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\\\/\",\"name\":\"Two New Vulnerabilities Could Affect 40% Of Ubuntu Cloud Workloads 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads.png\",\"datePublished\":\"2023-07-27T13:50:02+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads.png\",\"width\":1024,\"height\":555},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,linux,flaw\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinelinuxflaw\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Two New Vulnerabilities Could Affect 40% Of Ubuntu Cloud Workloads\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Two New Vulnerabilities Could Affect 40% Of Ubuntu Cloud Workloads 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/","og_locale":"en_US","og_type":"article","og_title":"Two New Vulnerabilities Could Affect 40% Of Ubuntu Cloud Workloads 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-07-27T13:50:02+00:00","og_image":[{"url":"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/07\/GameOverlay-Ubuntu-Vulnerability-1024x555.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Two New Vulnerabilities Could Affect 40% Of Ubuntu Cloud Workloads","datePublished":"2023-07-27T13:50:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/"},"wordCount":569,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads.png","keywords":["headline,linux,flaw"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/","url":"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/","name":"Two New Vulnerabilities Could Affect 40% Of Ubuntu Cloud Workloads 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads.png","datePublished":"2023-07-27T13:50:02+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads.png","width":1024,"height":555},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/two-new-vulnerabilities-could-affect-40-of-ubuntu-cloud-workloads\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,linux,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinelinuxflaw\/"},{"@type":"ListItem","position":3,"name":"Two New Vulnerabilities Could Affect 40% Of Ubuntu Cloud Workloads"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52983"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52983\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/52984"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}