6.5

CVE-2023-0751

When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.

Data is provided by the National Vulnerability Database (NVD)
FreebsdFreebsd Version12.3 Update-
FreebsdFreebsd Version12.3 Updatep1
FreebsdFreebsd Version12.3 Updatep2
FreebsdFreebsd Version12.3 Updatep3
FreebsdFreebsd Version12.3 Updatep4
FreebsdFreebsd Version12.3 Updatep5
FreebsdFreebsd Version12.4 Update-
FreebsdFreebsd Version12.4 Updaterc2-p1
FreebsdFreebsd Version12.4 Updaterc2-p2
FreebsdFreebsd Version13.1 Update-
FreebsdFreebsd Version13.1 Updateb1-p1
FreebsdFreebsd Version13.1 Updateb2-p2
FreebsdFreebsd Version13.1 Updatep1
FreebsdFreebsd Version13.1 Updatep2
FreebsdFreebsd Version13.1 Updatep3
FreebsdFreebsd Version13.1 Updatep4
FreebsdFreebsd Version13.1 Updatep5
FreebsdFreebsd Version13.1 Updaterc1-p1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.32% 0.546
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
134c704f-9b21-4f2e-91b3-4a467353bcc0 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.