Логотип exploitDog
bind:CVE-2023-0751
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-0751

Количество 2

Количество 2

nvd логотип

CVE-2023-0751

около 3 лет назад

When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-4j3q-rqjq-x3f3

около 3 лет назад

When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-0751

When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.

CVSS3: 6.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-4j3q-rqjq-x3f3

When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.

CVSS3: 6.5
0%
Низкий
около 3 лет назад

Уязвимостей на страницу