Vulnerability in encrypted loop device for Linux

15

Author: JT Smith

LinuxSecurity Contributor writes: “The following text describes a security hole in the encrypted loop device for linux. Because of it,

an attacker is able to modify the content of the encrypted device without being detected. This text

proposes to fix the hole by authenticating the device. More at LinuxSecurity.

Category:

  • Linux