Vulnerability Database

289,599

Total vulnerabilities in the database

CVE-2023-0751

When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.

  • Published: Feb 8, 2023
  • Updated: Nov 8, 2023
  • CVE: CVE-2023-0751
  • Severity: Medium
  • Exploit:

CVSS v3:

  • Severity: Medium
  • Score: 6.5
  • AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

No CWE or OWASP classifications available.

Software From Fixed in
freebsd / freebsd 12.4-rc2-p2 12.4-rc2-p2.x
freebsd / freebsd 12.4-rc2-p1 12.4-rc2-p1.x
freebsd / freebsd 13.1-b1-p1 13.1-b1-p1.x
freebsd / freebsd 13.1-b2-p2 13.1-b2-p2.x
freebsd / freebsd 13.1-rc1-p1 13.1-rc1-p1.x
freebsd / freebsd 13.1-p1 13.1-p1.x
freebsd / freebsd 13.1-p2 13.1-p2.x
freebsd / freebsd 13.1-p3 13.1-p3.x
freebsd / freebsd 13.1-p4 13.1-p4.x
freebsd / freebsd 13.1-p5 13.1-p5.x
freebsd / freebsd 12.3-p1 12.3-p1.x
freebsd / freebsd 12.3-p2 12.3-p2.x
freebsd / freebsd 12.3-p3 12.3-p3.x
freebsd / freebsd 12.3-p4 12.3-p4.x
freebsd / freebsd 12.3-p5 12.3-p5.x
freebsd / freebsd 13.1 13.1.x
freebsd / freebsd 12.4 12.4.x
freebsd / freebsd 12.3 12.3.x