ntfs3 in the Linux kernel through 6.8.0 allows a physically proximate attacker to read kernel memory by mounting a filesystem (e.g., if a Linux distribution is configured to allow unprivileged mounts of removable media) and then leveraging local access to trigger an out-of-bounds read. A length value can be larger than the amount of memory allocated. NOTE: the supplier's perspective is that there is no vulnerability when an attack requires an attacker-modified filesystem image.
                
            References
                    Configurations
                    No configuration.
History
                    01 Nov 2024, 08:35
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.1 | 
| CWE | CWE-276 | 
04 Sep 2024, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) ntfs3 in the Linux kernel through 6.8.0 allows a physically proximate attacker to read kernel memory by mounting a filesystem (e.g., if a Linux distribution is configured to allow unprivileged mounts of removable media) and then leveraging local access to trigger an out-of-bounds read. A length value can be larger than the amount of memory allocated. NOTE: the supplier's perspective is that there is no vulnerability when an attack requires an attacker-modified filesystem image. | 
28 Aug 2024, 12:57
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
28 Aug 2024, 05:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-08-28 05:15
Updated : 2024-11-01 08:35
NVD link : CVE-2023-45896
Mitre link : CVE-2023-45896
CVE.ORG link : CVE-2023-45896
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-276
                        
            Incorrect Default Permissions
