CVE-2025-58356

Source
https://cve.org/CVERecord?id=CVE-2025-58356
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-58356.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-58356
Aliases
Published
2025-10-27T19:33:23.969Z
Modified
2025-12-05T10:20:38.392100Z
Severity
  • 8.3 (High) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Constellation allows insecure use of LUKS2 persistent storage partitions
Details

Constellation is the first Confidential Kubernetes. The Constellation CVM image uses LUKS2-encrypted volumes for persistent storage. When opening an encrypted storage device, the CVM uses the libcryptsetup function cryptactivatebypasshrase. If the VM is successful in opening the partition with the disk encryption key, it treats the volume as confidential. However, due to the unsafe handling of null keyslot algorithms in the cryptsetup 2.8.1, it is possible that the opened volume is not encrypted at all. Cryptsetup prior to version 2.8.1 does not report an error when processing LUKS2-formatted disks that use the ciphernull-ecb algorithm in the keyslot encryption field. This vulnerability is fixed in 2.24.0.

Database specific
{
    "cwe_ids": [
        "CWE-347"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/58xxx/CVE-2025-58356.json"
}
References

Affected packages

Git / github.com/edgelesssys/constellation

Affected ranges

Type
GIT
Repo
https://github.com/edgelesssys/constellation
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.0.0
v2.*
v2.1.0-pre
v2.11.0
v2.2.0-pre
v2.3.0-pre
v2.4.0-pre
v2.5.0-pre
v2.6.0-pre
v2.7.0-pre
v2.8.0-pre

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-58356.json"