The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Tuesday positioned a security flaw impacting the Linux kernel in its Recognized Exploited Vulnerabilities (KEV) catalog, stating it has been actively exploited within the wild.
The vulnerability, CVE-2023-0386 (CVSS rating: 7.8), is an improper possession bug within the Linux kernel that may very well be exploited to escalate privileges on prone programs. It was patched in early 2023.
“Linux kernel comprises an improper possession administration vulnerability, the place unauthorized entry to the execution of the setuid file with capabilities was discovered within the Linux kernel’s OverlayFS subsystem in how a person copies a succesful file from a nosuid mount into one other mount,” the company mentioned.

“This uid mapping bug permits a neighborhood person to escalate their privileges on the system.”
It is at the moment not identified how the security flaw is being exploited within the wild. In a report printed in Might 2023, Datadog mentioned the vulnerability is trivial to take advantage of and that it really works by tricking the kernel into making a SUID binary owned by root in a folder like “/tmp” and executing it.

“CVE-2023-0386 lies in the truth that when the kernel copied a file from the overlay file system to the ‘higher’ listing, it didn’t verify if the person/group proudly owning this file was mapped within the present person namespace,” the corporate mentioned.
“This permits an unprivileged person to smuggle an SUID binary from a ‘decrease’ listing to the ‘higher’ listing, through the use of OverlayFS as an middleman.”
Later that yr, cloud security agency Wiz detailed two security vulnerabilities dubbed GameOver(lay) (CVE-2023-32629 and CVE-2023-2640) affecting Unix programs that led to related penalties as CVE-2023-0386.
“These flaws enable the creation of specialised executables, which, upon execution, grant the power to escalate privileges to root on the affected machine,” Wiz researchers mentioned.
Federal Civilian Government Department (FCEB) businesses are required to use the mandatory patches by July 8, 2025, to safe their networks towards energetic threats.



