CVE-2023-0386

Updated: 2025-11-10 03:10:07.582483

Description:

A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Known exploits

Added Date Description Due Date Notes
2025-06-17 Linux Kernel contains an improper ownership management vulnerability, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. 2025-07-08 This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a ; https://access.redhat.com/security/cve/cve-2023-0386 ; https://security.netapp.com/advisory/ntap-20230420-0004/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-0386

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Not Vulnerable 2025-09-10 15:09:23
Ubuntu 16.04 ELS linux 4.4.0 7.8 HIGH Not Vulnerable 2025-09-10 15:09:18
Ubuntu 18.04 ELS linux 4.15.0 7.8 HIGH Not Vulnerable 2025-09-10 15:09:20
Ubuntu 20.04 ELS linux 5.4.0 7.8 HIGH Released CLSA-2025:1753085842 2025-07-22 00:50:15
Total: 14