When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
References
Link | Resource |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:01.geli.asc | Mitigation Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2023-02-08 12:15
Updated : 2023-02-16 14:21
NVD link : CVE-2023-0751
Mitre link : CVE-2023-0751
JSON object : View
CWE
Products Affected
freebsd
- freebsd