CVE-2023-0751
08.02.2023, 20:15
When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.Enginsight
Vendor | Product | Version |
---|---|---|
freebsd | freebsd | 12.3 |
freebsd | freebsd | 12.3:p1 |
freebsd | freebsd | 12.3:p2 |
freebsd | freebsd | 12.3:p3 |
freebsd | freebsd | 12.3:p4 |
freebsd | freebsd | 12.3:p5 |
freebsd | freebsd | 12.4 |
freebsd | freebsd | 12.4:rc2-p1 |
freebsd | freebsd | 12.4:rc2-p2 |
freebsd | freebsd | 13.1 |
freebsd | freebsd | 13.1:b1-p1 |
freebsd | freebsd | 13.1:b2-p2 |
freebsd | freebsd | 13.1:p1 |
freebsd | freebsd | 13.1:p2 |
freebsd | freebsd | 13.1:p3 |
freebsd | freebsd | 13.1:p4 |
freebsd | freebsd | 13.1:p5 |
freebsd | freebsd | 13.1:rc1-p1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration