ntfs3 in the Linux kernel through 6.8.0 allows a physically proximate attacker to read kernel memory by mounting a filesystem (e.g., if a Linux distribution is configured to allow unprivileged mounts of removable media) and then leveraging local access to trigger an out-of-bounds read. A length value can be larger than the amount of memory allocated. NOTE: the supplier's perspective is that there is no vulnerability when an attack requires an attacker-modified filesystem image.
References
Configurations
No configuration.
History
01 Nov 2024, 08:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-276 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
04 Sep 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) ntfs3 in the Linux kernel through 6.8.0 allows a physically proximate attacker to read kernel memory by mounting a filesystem (e.g., if a Linux distribution is configured to allow unprivileged mounts of removable media) and then leveraging local access to trigger an out-of-bounds read. A length value can be larger than the amount of memory allocated. NOTE: the supplier's perspective is that there is no vulnerability when an attack requires an attacker-modified filesystem image. |
28 Aug 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
28 Aug 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-28 05:15
Updated : 2024-11-01 08:35
NVD link : CVE-2023-45896
Mitre link : CVE-2023-45896
CVE.ORG link : CVE-2023-45896
JSON object : View
Products Affected
No product.
CWE
CWE-276
Incorrect Default Permissions