A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | 5.11 (including) | 5.15.91 (excluding) |
Linux_kernel | Linux | 5.16 (including) | 6.1.9 (excluding) |
Linux_kernel | Linux | 6.2-rc1 (including) | 6.2-rc1 (including) |
Linux_kernel | Linux | 6.2-rc2 (including) | 6.2-rc2 (including) |
Linux_kernel | Linux | 6.2-rc3 (including) | 6.2-rc3 (including) |
Linux_kernel | Linux | 6.2-rc4 (including) | 6.2-rc4 (including) |
Linux_kernel | Linux | 6.2-rc5 (including) | 6.2-rc5 (including) |