The encrypted loop device in Linux kernel 2.4.10 and previous versions does not authenticate the entity that is encrypting data, which allows local users to modify encrypted data without knowing the key.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel 2.2.0 |
||
linux linux kernel 2.2.1 |
||
linux linux kernel 2.2.16 |
||
linux linux kernel 2.2.17 |
||
linux linux kernel 2.2.5 |
||
linux linux kernel 2.2.6 |
||
linux linux kernel 2.4.12 |
||
linux linux kernel 2.4.13 |
||
linux linux kernel 2.4.4 |
||
linux linux kernel 2.4.5 |
||
linux linux kernel 2.2.10 |
||
linux linux kernel 2.2.11 |
||
linux linux kernel 2.2.18 |
||
linux linux kernel 2.2.19 |
||
linux linux kernel 2.2.7 |
||
linux linux kernel 2.2.8 |
||
linux linux kernel 2.2.9 |
||
linux linux kernel 2.4.14 |
||
linux linux kernel 2.4.15 |
||
linux linux kernel 2.4.6 |
||
linux linux kernel 2.4.7 |
||
linux linux kernel 2.2.14 |
||
linux linux kernel 2.2.15 |
||
linux linux kernel 2.2.3 |
||
linux linux kernel 2.2.4 |
||
linux linux kernel 2.4.10 |
||
linux linux kernel 2.4.11 |
||
linux linux kernel 2.4.2 |
||
linux linux kernel 2.4.3 |
||
linux linux kernel 2.2.12 |
||
linux linux kernel 2.2.13 |
||
linux linux kernel 2.2.2 |
||
linux linux kernel 2.2.20 |
||
linux linux kernel 2.4.0 |
||
linux linux kernel 2.4.1 |
||
linux linux kernel 2.4.16 |
||
linux linux kernel 2.4.17 |
||
linux linux kernel 2.4.8 |
||
linux linux kernel 2.4.9 |