A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "20.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "22.04"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.15.91"
}
]
},
{
"events": [
{
"introduced": "5.16"
},
{
"fixed": "6.1.9"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.2-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.2-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.2-rc3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.2-rc4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.2-rc5"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-0386.json"