First published: Wed Feb 08 2023(Updated: )
When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =12.3 | |
FreeBSD Kernel | =12.3-p1 | |
FreeBSD Kernel | =12.3-p2 | |
FreeBSD Kernel | =12.3-p3 | |
FreeBSD Kernel | =12.3-p4 | |
FreeBSD Kernel | =12.3-p5 | |
FreeBSD Kernel | =12.4 | |
FreeBSD Kernel | =12.4-rc2-p1 | |
FreeBSD Kernel | =12.4-rc2-p2 | |
FreeBSD Kernel | =13.1 | |
FreeBSD Kernel | =13.1-b1-p1 | |
FreeBSD Kernel | =13.1-b2-p2 | |
FreeBSD Kernel | =13.1-p1 | |
FreeBSD Kernel | =13.1-p2 | |
FreeBSD Kernel | =13.1-p3 | |
FreeBSD Kernel | =13.1-p4 | |
FreeBSD Kernel | =13.1-p5 | |
FreeBSD Kernel | =13.1-rc1-p1 | |
=12.3 | ||
=12.3-p1 | ||
=12.3-p2 | ||
=12.3-p3 | ||
=12.3-p4 | ||
=12.3-p5 | ||
=12.4 | ||
=12.4-rc2-p1 | ||
=12.4-rc2-p2 | ||
=13.1 | ||
=13.1-b1-p1 | ||
=13.1-b2-p2 | ||
=13.1-p1 | ||
=13.1-p2 | ||
=13.1-p3 | ||
=13.1-p4 | ||
=13.1-p5 | ||
=13.1-rc1-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-0751 is medium with a severity value of 6.5.
CVE-2023-0751 affects Freebsd Freebsd 12.3.
To fix CVE-2023-0751, update to the latest version of Freebsd Freebsd or apply the necessary patches.
You can find more information about CVE-2023-0751 on the FreeBSD Security Advisories website.
The Common Weakness Enumeration (CWE) ID for CVE-2023-0751 is 20.