CVE-2023-49298
OpenZFS through 2.1.13 and 2.2.x through 2.2.1, in certain scenarios involving applications that try to rely on efficient copying of file data, can replace file contents with zero-valued bytes and thus potentially disable security mechanisms. NOTE: this issue is not always security related, but can be security related in realistic situations. A possible example is cp, from a recent GNU Core Utilities (coreutils) version, when attempting to preserve a rule set for denying unauthorized access. (One might use cp when configuring access control, such as with the /etc/hosts.deny file specified in the IBM Support reference.) NOTE: this issue occurs less often in version 2.2.1, and in versions before 2.1.4, because of the default configuration in those versions.
Published
2023-11-24T19:15:07.587
Last Modified
2024-11-21T08:33:13.023
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 7.5 (HIGH)
Weaknesses
-
Type: Primary
CWE-639
-
Type: Secondary
CWE-639
Affected Vendors & Products
References
-
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275308
Issue Tracking, Patch
([email protected])
-
https://bugs.gentoo.org/917224
([email protected])
-
https://github.com/openzfs/zfs/issues/15526
Exploit, Issue Tracking, Patch, Vendor Advisory
([email protected])
-
https://github.com/openzfs/zfs/pull/15571
Exploit, Patch, Vendor Advisory
([email protected])
-
https://github.com/openzfs/zfs/releases/tag/zfs-2.1.14
([email protected])
-
https://github.com/openzfs/zfs/releases/tag/zfs-2.2.2
([email protected])
-
https://lists.debian.org/debian-lts-announce/2024/03/msg00019.html
([email protected])
-
https://news.ycombinator.com/item?id=38405731
Patch, Third Party Advisory
([email protected])
-
https://news.ycombinator.com/item?id=38770168
([email protected])
-
https://web.archive.org/web/20231124172959/https://www.ibm.com/support/pages/how-remove-missing%C2%A0newline%C2%A0or%C2%A0line%C2%A0too%C2%A0long-error-etchostsallow%C2%A0and%C2%A0etchostsdeny-files
Third Party Advisory
([email protected])
-
https://www.theregister.com/2023/12/04/two_new_versions_of_openzfs/
([email protected])
-
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275308
Issue Tracking, Patch
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugs.gentoo.org/917224
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/openzfs/zfs/issues/15526
Exploit, Issue Tracking, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/openzfs/zfs/pull/15571
Exploit, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/openzfs/zfs/releases/tag/zfs-2.1.14
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/openzfs/zfs/releases/tag/zfs-2.2.2
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2024/03/msg00019.html
(af854a3a-2127-422b-91ae-364da2661108)
-
https://news.ycombinator.com/item?id=38405731
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://news.ycombinator.com/item?id=38770168
(af854a3a-2127-422b-91ae-364da2661108)
-
https://web.archive.org/web/20231124172959/https://www.ibm.com/support/pages/how-remove-missing%C2%A0newline%C2%A0or%C2%A0line%C2%A0too%C2%A0long-error-etchostsallow%C2%A0and%C2%A0etchostsdeny-files
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.theregister.com/2023/12/04/two_new_versions_of_openzfs/
(af854a3a-2127-422b-91ae-364da2661108)