When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
References
Link Resource
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:01.geli.asc Mitigation Patch Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: freebsd

Published: 2023-02-08T19:25:01.118Z

Updated:

Reserved: 2023-02-08T15:34:03.264Z


Link: CVE-2023-0751

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-02-08T20:15:24.377

Modified: 2023-11-07T04:01:23.443


Link: CVE-2023-0751

JSON object: View

cve-icon Redhat Information

No data.