CVE-2023-49298

7.5 HIGH
Published: November 24, 2023 Modified: November 03, 2025

Description

OpenZFS through 2.1.13 and 2.2.x through 2.2.1, in certain scenarios involving applications that try to rely on efficient copying of file data, can replace file contents with zero-valued bytes and thus potentially disable security mechanisms. NOTE: this issue is not always security related, but can be security related in realistic situations. A possible example is cp, from a recent GNU Core Utilities (coreutils) version, when attempting to preserve a rule set for denying unauthorized access. (One might use cp when configuring access control, such as with the /etc/hosts.deny file specified in the IBM Support reference.) NOTE: this issue occurs less often in version 2.2.1, and in versions before 2.1.4, because of the default configuration in those versions.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275308
Source: cve@mitre.org
Issue Tracking Patch
https://bugs.gentoo.org/917224
Source: cve@mitre.org
https://github.com/openzfs/zfs/issues/15526
Source: cve@mitre.org
Exploit Issue Tracking Patch Vendor Advisory
https://github.com/openzfs/zfs/pull/15571
Source: cve@mitre.org
Exploit Patch Vendor Advisory
https://news.ycombinator.com/item?id=38405731
Source: cve@mitre.org
Patch Third Party Advisory
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275308
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch
https://bugs.gentoo.org/917224
Source: af854a3a-2127-422b-91ae-364da2661108
https://github.com/openzfs/zfs/issues/15526
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Issue Tracking Patch Vendor Advisory
https://github.com/openzfs/zfs/pull/15571
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch Vendor Advisory
https://github.com/openzfs/zfs/releases/tag/zfs-2.1.14
Source: af854a3a-2127-422b-91ae-364da2661108
https://github.com/openzfs/zfs/releases/tag/zfs-2.2.2
Source: af854a3a-2127-422b-91ae-364da2661108
https://news.ycombinator.com/item?id=38405731
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://news.ycombinator.com/item?id=38770168
Source: af854a3a-2127-422b-91ae-364da2661108

23 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.5 / 10.0
EPSS (Exploit Probability)
0.7%
72th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

freebsd openzfs