When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: freebsd
Published:
Updated: 2024-08-02T05:24:34.119Z
Reserved: 2023-02-08T15:34:03.264Z
Link: CVE-2023-0751

No data.

Status : Modified
Published: 2023-02-08T20:15:24.377
Modified: 2024-11-21T07:37:45.253
Link: CVE-2023-0751

No data.