zfs-linux 安全漏洞 (CVE-2023-49298)
CVE编号
CVE-2023-49298利用情况
暂无补丁情况
N/A披露时间
2023-11-25漏洞描述
OpenZFS through 2.1.13 and 2.2.x through 2.2.1, in certain scenarios involving applications that try to rely on efficient copying of file data, can replace file contents with zero-valued bytes and thus potentially disable security mechanisms. NOTE: this issue is not always security related, but can be security related in realistic situations. A possible example is cp, from a recent GNU Core Utilities (coreutils) version, when attempting to preserve a rule set for denying unauthorized access. (One might use cp when configuring access control, such as with the /etc/hosts.deny file specified in the IBM Support reference.) NOTE: this issue occurs less often in version 2.2.1, and in versions before 2.1.4, because of the default configuration in those versions.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | debian_10 | zfs-linux | * | Up to (including) 0.7.12-2+deb10u2 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | zfs-linux | * | Up to (including) 2.0.3-9+deb11u1 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | zfs-linux | * | Up to (including) 2.1.11-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | zfs-linux | * | Up to (including) 2.1.13-1 | |||||
- 攻击路径 N/A
- 攻击复杂度 N/A
- 权限要求 N/A
- 影响范围 N/A
- 用户交互 N/A
- 可用性 N/A
- 保密性 N/A
- 完整性 N/A
CWE-ID | 漏洞类型 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论