First published: Fri Nov 24 2023(Updated: )
OpenZFS through 2.1.13 and 2.2.x through 2.2.1, in certain scenarios involving applications that try to rely on efficient copying of file data, can replace file contents with zero-valued bytes and thus potentially disable security mechanisms. NOTE: this issue is not always security related, but can be security related in realistic situations. A possible example is cp, from a recent GNU Core Utilities (coreutils) version, when attempting to preserve a rule set for denying unauthorized access. (One might use cp when configuring access control, such as with the /etc/hosts.deny file specified in the IBM Support reference.) NOTE: this issue occurs less often in version 2.2.1, and in versions before 2.1.4, because of the default configuration in those versions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
OpenZFS OpenZFS | <=2.1.13 | |
OpenZFS OpenZFS | =2.2.0 | |
FreeBSD FreeBSD | =14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-49298.
The severity level of CVE-2023-49298 is high with a score of 7.5.
OpenZFS versions 2.1.13 and 2.2.0 through 2.2.1 are affected by CVE-2023-49298.
CVE-2023-49298 can potentially disable the security mechanisms by replacing file contents with zero-valued bytes.
Yes, you can find more information about CVE-2023-49298 in the following references: 1. [GitHub - openzfs/zfs/pull/15571](https://github.com/openzfs/zfs/pull/15571) 2. [GitHub - openzfs/zfs/issues/15526](https://github.com/openzfs/zfs/issues/15526) 3. [Bugzilla - bugs.freebsd.org/bugzilla/show_bug.cgi?id=275308](https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275308)