CVE detail
CVE-2023-0386: Linux Kernel Improper Ownership Management Vulnerability
Source: CISA Known Exploited Vulnerabilities catalog · back to feed
Vendor / product
Linux · Kernel
- Date added (KEV)
- Jun 17, 2025
- CISA due date
- Jul 08, 2025
- Ransomware campaign use
- Unknown
Required action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Vendor fix: Vendor patch
Scorifya interpretation
AI-generatedA short, structured read of the record above — generated when this page first loads, then cached for a week.
Plain English
Technical detail
From CISA
Linux Kernel contains an improper ownership management vulnerability, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a ; https://access.redhat.com/security/cve/cve-2023-0386 ; https://security.netapp.com/advisory/ntap-20230420-0004/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-0386
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0aBroken LinkMailing ListPatch
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0aBroken LinkMailing ListPatch
- http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.htmlThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/06/msg00008.htmlMailing ListThird Party Advisory
Other recent CVEs from Linux
- CVE-2026-31431Kernel — Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability
- CVE-2018-14634Kernel — Linux Kernel Integer Overflow Vulnerability
- CVE-2021-22555Kernel — Linux Kernel Heap Out-of-Bounds Write Vulnerability
- CVE-2025-38352Kernel — Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability
- CVE-2024-53150Kernel — Linux Kernel Out-of-Bounds Read Vulnerability
Check your domain's public posture
Scorifya doesn't test for specific CVEs, but if patching Linux changed your headers or TLS, a fresh hardening scan helps confirm nothing regressed externally.