Metrics
Affected Vendors & Products
Fri, 01 Nov 2024 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-276 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 04 Sep 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ntfs3 in the Linux kernel before 6.5.11 allows a physically proximate attacker to read kernel memory by mounting a filesystem (e.g., if a Linux distribution is configured to allow unprivileged mounts of removable media) and then leveraging local access to trigger an out-of-bounds read. A length value can be larger than the amount of memory allocated. NOTE: the supplier's perspective is that there is no vulnerability when an attack requires an attacker-modified filesystem image. | ntfs3 in the Linux kernel through 6.8.0 allows a physically proximate attacker to read kernel memory by mounting a filesystem (e.g., if a Linux distribution is configured to allow unprivileged mounts of removable media) and then leveraging local access to trigger an out-of-bounds read. A length value can be larger than the amount of memory allocated. NOTE: the supplier's perspective is that there is no vulnerability when an attack requires an attacker-modified filesystem image. |
Thu, 29 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | kernel: ntfs3: kernel memory read by mounting a filesystem | |
Weaknesses | CWE-125 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 28 Aug 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 28 Aug 2024 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ntfs3 in the Linux kernel before 6.5.11 allows a physically proximate attacker to read kernel memory by mounting a filesystem (e.g., if a Linux distribution is configured to allow unprivileged mounts of removable media) and then leveraging local access to trigger an out-of-bounds read. A length value can be larger than the amount of memory allocated. NOTE: the supplier's perspective is that there is no vulnerability when an attack requires an attacker-modified filesystem image. | |
References |
|
|
Status: PUBLISHED
Assigner: mitre
Published: 2024-08-28T00:00:00
Updated: 2024-10-31T17:02:37.631Z
Reserved: 2023-10-16T00:00:00
Link: CVE-2023-45896
Updated: 2024-08-28T13:51:22.828Z
Status : Awaiting Analysis
Published: 2024-08-28T05:15:13.657
Modified: 2024-11-01T08:35:03.997
Link: CVE-2023-45896