When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
                
            References
                    | Link | Resource | 
|---|---|
| https://security.FreeBSD.org/advisories/FreeBSD-SA-23:01.geli.asc | Mitigation Patch Vendor Advisory | 
| https://security.FreeBSD.org/advisories/FreeBSD-SA-23:01.geli.asc | Mitigation Patch Vendor Advisory | 
| https://security.netapp.com/advisory/ntap-20230316-0004/ | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 07:37
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
|
| References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-23:01.geli.asc - Mitigation, Patch, Vendor Advisory | 
07 Nov 2023, 04:01
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key. | 
Information
                Published : 2023-02-08 20:15
Updated : 2025-03-25 14:15
NVD link : CVE-2023-0751
Mitre link : CVE-2023-0751
CVE.ORG link : CVE-2023-0751
JSON object : View
Products Affected
                freebsd
- freebsd
 
CWE
                