When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
References
Link | Resource |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:01.geli.asc | Mitigation Patch Vendor Advisory |
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:01.geli.asc | Mitigation Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230316-0004/ |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:37
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-23:01.geli.asc - Mitigation, Patch, Vendor Advisory |
07 Nov 2023, 04:01
Type | Values Removed | Values Added |
---|---|---|
Summary | When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key. |
Information
Published : 2023-02-08 20:15
Updated : 2024-11-21 07:37
NVD link : CVE-2023-0751
Mitre link : CVE-2023-0751
CVE.ORG link : CVE-2023-0751
JSON object : View
Products Affected
freebsd
- freebsd
CWE