Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-0386: CWE-282 in Kernel

0
High
VulnerabilityCVE-2023-0386cvecve-2023-0386cwe-282
Published: Wed Mar 22 2023 (03/22/2023, 00:00:00 UTC)
Source: CVE Database V5
Product: Kernel

Description

A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.

AI-Powered Analysis

AILast updated: 10/28/2025, 22:10:19 UTC

Technical Analysis

CVE-2023-0386 is a vulnerability identified in the Linux kernel version 6.2-rc6, specifically within the OverlayFS filesystem subsystem. OverlayFS allows the overlaying of one filesystem on top of another, commonly used in container environments and various Linux distributions. The vulnerability stems from a flaw in how the kernel handles setuid files with capabilities when they are copied from a mount point with the 'nosuid' option to another mount point. The 'nosuid' mount option is intended to prevent the execution of setuid binaries, which can escalate privileges. However, due to improper UID mapping and capability handling in OverlayFS, a local user can bypass these restrictions and execute a setuid file with elevated capabilities. This results in unauthorized privilege escalation, allowing the attacker to gain higher system privileges than intended. The vulnerability is classified under CWE-282, which relates to improper control of an object's lifetime or improper authorization. The CVSS v3.1 base score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits have been reported in the wild, the nature of the flaw makes it a significant risk for systems running the affected kernel versions, especially those exposed to multiple local users or untrusted accounts. The vulnerability is particularly relevant for environments using containerization or overlay filesystems extensively, such as cloud services and enterprise Linux deployments.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily in environments where Linux kernel 6.2-rc6 or similar versions are deployed, especially in servers, cloud infrastructure, and containerized applications. Successful exploitation allows a local attacker to escalate privileges, potentially gaining root access, which can lead to full system compromise. This threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by enabling denial-of-service conditions or persistent backdoors. Critical sectors such as finance, healthcare, government, and industrial control systems that rely on Linux-based infrastructure could face severe operational disruptions and data breaches. The local attack vector means that insider threats or compromised user accounts are the primary concern. Given the widespread use of Linux in European data centers and cloud providers, the vulnerability could facilitate lateral movement within networks if exploited. Although no public exploits are known yet, the high CVSS score and the nature of the flaw warrant urgent attention to prevent potential future attacks.

Mitigation Recommendations

1. Monitor official Linux kernel repositories and vendor advisories for patches addressing CVE-2023-0386 and apply updates promptly once available. 2. Until patches are deployed, restrict local user access to systems running the affected kernel versions, especially limiting untrusted or low-privilege accounts. 3. Implement strict access controls and auditing on systems using OverlayFS, particularly in container environments, to detect suspicious file operations involving setuid binaries. 4. Consider disabling OverlayFS or avoiding the use of 'nosuid' mounts in configurations where possible, to reduce attack surface. 5. Employ mandatory access control frameworks like SELinux or AppArmor to enforce additional restrictions on file execution and capability usage. 6. Regularly review and harden container and filesystem configurations to prevent unauthorized privilege escalations. 7. Educate system administrators about the risks of local privilege escalation vulnerabilities and encourage proactive security practices. 8. Use intrusion detection systems and endpoint monitoring tools to identify anomalous behavior indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-01-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9a4247d717aace21690

Added to database: 10/21/2025, 7:06:12 PM

Last enriched: 10/28/2025, 10:10:19 PM

Last updated: 10/30/2025, 10:24:31 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats