First published: Fri Feb 12 2021(Updated: )
An issue was discovered in OpenZFS through 2.0.3. When an NFS share is exported to IPv6 addresses via the sharenfs feature, there is a silent failure to parse the IPv6 address data, and access is allowed to everyone. IPv6 restrictions from the configuration are not applied.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenZFS OpenZFS | <=2.0.3 | |
debian/zfs-linux | <=0.7.12-2+deb10u2<=2.0.3-9+deb11u1<=2.1.11-1 | 2.2.2-4 |
ubuntu/zfs-linux | <0.8.3-1ubuntu12.16 | 0.8.3-1ubuntu12.16 |
ubuntu/zfs-linux | <2.1.9-2ubuntu1.2 | 2.1.9-2ubuntu1.2 |
ubuntu/zfs-linux | <2.1.5-1ubuntu6~22.04.2 | 2.1.5-1ubuntu6~22.04.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability CVE-2013-20001 is an issue discovered in OpenZFS through version 2.0.3 that allows unauthorized access to an NFS share when exported to IPv6 addresses.
The vulnerability CVE-2013-20001 affects OpenZFS by silently failing to parse IPv6 address data when exporting an NFS share, allowing access to everyone.
The severity of vulnerability CVE-2013-20001 is high with a severity value of 7.5.
To fix the vulnerability CVE-2013-20001 in OpenZFS, you should update to a version of OpenZFS that is newer than 2.0.3.
You can find more information about the vulnerability CVE-2013-20001 in the references provided: [Link 1](https://github.com/openzfs/zfs/issues/1894#issuecomment-30693652), [Link 2](https://github.com/openzfs/zfs/releases).