Linux Kernel Improper Ownership Management Vulnerability (CVE-2023-0386)
Linux Kernel contains an improper ownership management vulnerability, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
A local attacker, with a low-privilege account, can achieve full data confidentiality loss, arbitrary modification of data, complete denial of service or system unavailability. Federal agencies are required to remediate by 2025-07-08 under CISA BOD 22-01.
This is a Software Vulnerability (CWE-282) (CWE-282) vulnerability in Linux Kernel. A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. Exploitation requires local access, low attack complexity, a low-privilege authenticated account, and no user interaction required.
Probably yes if any of these apply:
CISA added this CVE to the Known Exploited Vulnerabilities catalog on 2025-06-17 based on evidence of active exploitation in the wild. Federal agencies required to remediate by 2025-07-08.
Manual remediation steps
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.