When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
History

Tue, 25 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published:

Updated: 2025-03-25T13:47:39.852Z

Reserved: 2023-02-08T15:34:03.264Z

Link: CVE-2023-0751

cve-icon Vulnrichment

Updated: 2024-08-02T05:24:34.119Z

cve-icon NVD

Status : Modified

Published: 2023-02-08T20:15:24.377

Modified: 2025-03-25T14:15:20.480

Link: CVE-2023-0751

cve-icon Redhat

No data.