CVE-2023-0386
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
| CWE | CWE-282 |
| Vendor | n/a |
| Product | kernel |
| Published | Mar 22, 2023 |
| Last Updated | Oct 21, 2025 |
⚠️ Actively Exploited — Act Now
Get instant alerts for n/a kernel
This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2023-0386.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
n/a / Kernel
Linux kernel 6.2-rc6
References
git.kernel.org: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a security.netapp.com: https://security.netapp.com/advisory/ntap-20230420-0004/ debian.org: https://www.debian.org/security/2023/dsa-5402 lists.debian.org: https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html packetstormsecurity.com: http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-0386