NA

CVE-2023-49298

Published: 24/11/2023 Updated: 18/03/2024
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

OpenZFS up to and including 2.1.13 and 2.2.x up to and including 2.2.1, in certain scenarios involving applications that try to rely on efficient copying of file data, can replace file contents with zero-valued bytes and thus potentially disable security mechanisms. NOTE: this issue is not always security related, but can be security related in realistic situations. A possible example is cp, from a recent GNU Core Utilities (coreutils) version, when attempting to preserve a rule set for denying unauthorized access. (One might use cp when configuring access control, such as with the /etc/hosts.deny file specified in the IBM Support reference.) NOTE: this issue occurs less often in version 2.2.1, and in versions prior to 2.1.4, because of the default configuration in those versions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openzfs openzfs

openzfs openzfs 2.2.0

Vendor Advisories

Debian Bug report logs - #1056752 zfs-linux: CVE-2023-49298 Package: src:zfs-linux; Maintainer for src:zfs-linux is Debian ZFS on Linux maintainers <pkg-zfsonlinux-devel@alioth-listsdebiannet>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 25 Nov 2023 21:45:01 UTC Severity: important Tags: securi ...