Privilege Escalation Vulnerability in Linux Kernel’s OverlayFS System
CVE-2023-0386
Key Information:
Badges
Summary
A vulnerability exists in the Linux kernel's OverlayFS subsystem that enables a local user to gain unauthorized access to a setuid file with capabilities. This issue arises when a user copies a capable file from a nosuid mount to another mount, leading to potential privilege escalation. The uid mapping bug presents a significant risk to system security, allowing malicious actors with local access to increase their user privileges, potentially compromising system integrity.
Affected Version(s)
Kernel Linux kernel 6.2-rc6
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles

CVE-2023-0386 | Vulnerabilities
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file
References
CVSS V3.1
Timeline
- 📰
First article discovered by yitian.ir
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved