CVE-2023-0386

A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
Configurations

Configuration 1 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*

Configuration 8 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Jun 2025, 15:00

Type Values Removed Values Added
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List, Third Party Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a - Mailing List, Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a - Mailing List, Patch, Vendor Advisory, Broken Link
CPE cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
First Time Netapp h300s
Netapp h410c
Netapp h500s
Netapp h500s Firmware
Canonical
Netapp h410s Firmware
Netapp h700s Firmware
Netapp h410c Firmware
Netapp h300s Firmware
Netapp h410s
Canonical ubuntu Linux
Netapp
Netapp h700s
Debian debian Linux
Debian

26 Feb 2025, 16:15

Type Values Removed Values Added
References (MLIST) https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html - Mailing List, Third Party Advisory
References (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a - Mailing List, Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a - Mailing List, Patch, Vendor Advisory
References (DEBIAN) https://www.debian.org/security/2023/dsa-5402 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5402 - Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html - Third Party Advisory () http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20230420-0004/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20230420-0004/ - Third Party Advisory
CWE NVD-CWE-Other CWE-282

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

26 Jun 2023, 16:56

Type Values Removed Values Added
References (MLIST) https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html - (MLIST) https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html - Mailing List, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html - (MISC) http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2023/dsa-5402 - (DEBIAN) https://www.debian.org/security/2023/dsa-5402 - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20230420-0004/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20230420-0004/ - Third Party Advisory
References (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a - Mailing List, Patch (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a - Mailing List, Patch, Vendor Advisory

22 Jun 2023, 15:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html -

05 Jun 2023, 21:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html -

14 May 2023, 00:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2023/dsa-5402 -

20 Apr 2023, 09:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20230420-0004/ -

Information

Published : 2023-03-22 21:15

Updated : 2025-06-18 15:00


NVD link : CVE-2023-0386

Mitre link : CVE-2023-0386


JSON object : View

Products Affected

debian

  • debian_linux

netapp

  • h500s
  • h410s
  • h410c_firmware
  • h300s
  • h700s_firmware
  • h500s_firmware
  • h410s_firmware
  • h700s
  • h410c
  • h300s_firmware

canonical

  • ubuntu_linux

linux

  • linux_kernel
CWE
CWE-282

Improper Ownership Management