When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
References
Link | Resource |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:01.geli.asc | Mitigation Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: freebsd
Published: 2023-02-08T19:25:01.118Z
Updated:
Reserved: 2023-02-08T15:34:03.264Z
Link: CVE-2023-0751
JSON object: View
NVD Information
Status : Modified
Published: 2023-02-08T20:15:24.377
Modified: 2023-11-07T04:01:23.443
Link: CVE-2023-0751
JSON object: View
Redhat Information
No data.
CWE