CVE Vulnerabilities

CVE-2023-0751

Published: Feb 08, 2023 | Modified: Nov 07, 2023
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.

Affected Software

Name Vendor Start Version End Version
Freebsd Freebsd 12.3 (including) 12.3 (including)
Freebsd Freebsd 12.3-p1 (including) 12.3-p1 (including)
Freebsd Freebsd 12.3-p2 (including) 12.3-p2 (including)
Freebsd Freebsd 12.3-p3 (including) 12.3-p3 (including)
Freebsd Freebsd 12.3-p4 (including) 12.3-p4 (including)
Freebsd Freebsd 12.3-p5 (including) 12.3-p5 (including)
Freebsd Freebsd 12.4 (including) 12.4 (including)
Freebsd Freebsd 12.4-rc2-p1 (including) 12.4-rc2-p1 (including)
Freebsd Freebsd 12.4-rc2-p2 (including) 12.4-rc2-p2 (including)
Freebsd Freebsd 13.1 (including) 13.1 (including)
Freebsd Freebsd 13.1-b1-p1 (including) 13.1-b1-p1 (including)
Freebsd Freebsd 13.1-b2-p2 (including) 13.1-b2-p2 (including)
Freebsd Freebsd 13.1-p1 (including) 13.1-p1 (including)
Freebsd Freebsd 13.1-p2 (including) 13.1-p2 (including)
Freebsd Freebsd 13.1-p3 (including) 13.1-p3 (including)
Freebsd Freebsd 13.1-p4 (including) 13.1-p4 (including)
Freebsd Freebsd 13.1-p5 (including) 13.1-p5 (including)
Freebsd Freebsd 13.1-rc1-p1 (including) 13.1-rc1-p1 (including)

References