HomeOpenzfsCVE-2023-49298

CVE-2023-49298

HIGH
7.5CVSS
Published: 2023-11-24
Updated: 2025-11-03
AI Analysis

Description

OpenZFS through 2.1.13 and 2.2.x through 2.2.1, in certain scenarios involving applications that try to rely on efficient copying of file data, can replace file contents with zero-valued bytes and thus potentially disable security mechanisms. NOTE: this issue is not always security related, but can be security related in realistic situations. A possible example is cp, from a recent GNU Core Utilities (coreutils) version, when attempting to preserve a rule set for denying unauthorized access. (One might use cp when configuring access control, such as with the /etc/hosts.deny file specified in the IBM Support reference.) NOTE: this issue occurs less often in version 2.2.1, and in versions before 2.1.4, because of the default configuration in those versions.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
high
Availability
none
Weaknesses
CWE-639CWE-639

Metadata

Primary Vendor
OPENZFS
Published
11/24/2023
Last Modified
11/3/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

openzfs : openzfsopenzfs : openzfs

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2023-49298 | HIGH Severity | CVEDatabase.com | CVEDatabase.com