Vulnerability Description
When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 12.3 |
Related Weaknesses (CWE)
References
- https://security.FreeBSD.org/advisories/FreeBSD-SA-23:01.geli.ascMitigationPatchVendor Advisory
- https://security.FreeBSD.org/advisories/FreeBSD-SA-23:01.geli.ascMitigationPatchVendor Advisory
- https://security.netapp.com/advisory/ntap-20230316-0004/
FAQ
What is CVE-2023-0751?
CVE-2023-0751 is a vulnerability with a CVSS score of 6.5 (MEDIUM). When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the ...
How severe is CVE-2023-0751?
CVE-2023-0751 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-0751?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.