First published: Fri Apr 10 2015(Updated: )
The bsdinstall installer in FreeBSD 10.x before 10.1 p9, when configuring full disk encrypted ZFS, uses world-readable permissions for the GELI keyfile (/boot/encryption.key), which allows local users to obtain sensitive key information by reading the file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | <=10.1 | |
FreeBSD Kernel | =10.0 | |
FreeBSD Kernel | =10.0-rc1 | |
FreeBSD Kernel | =10.0-rc2 | |
FreeBSD Kernel | =10.1-rc1 | |
FreeBSD Kernel | =10.1-rc2 | |
FreeBSD Kernel | =10.1-rc3 | |
FreeBSD Kernel | =10.1-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1415 is classified as a high severity vulnerability due to the potential for sensitive information disclosure.
To mitigate CVE-2015-1415, ensure that the permissions for the /boot/encryption.key file are set to restrict access to only authorized users.
CVE-2015-1415 affects FreeBSD versions 10.0 and 10.1 prior to patch 9.
CVE-2015-1415 exposes sensitive encryption key information stored in a world-readable keyfile.
CVE-2015-1415 is a local vulnerability, as it requires local access to the system to exploit.