When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 25 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published:

Updated: 2025-03-25T13:47:39.852Z

Reserved: 2023-02-08T15:34:03.264Z

Link: CVE-2023-0751

cve-icon Vulnrichment

Updated: 2024-08-02T05:24:34.119Z

cve-icon NVD

Status : Modified

Published: 2023-02-08T20:15:24.377

Modified: 2025-03-25T14:15:20.480

Link: CVE-2023-0751

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.