First published: Tue Jun 11 2002(Updated: )
The encrypted loop device in Linux kernel 2.4.10 and earlier does not authenticate the entity that is encrypting data, which allows local users to modify encrypted data without knowing the key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =2.4.15 | |
Linux Linux kernel | =2.2.10 | |
Linux Linux kernel | =2.4.11 | |
Linux Linux kernel | =2.2.13 | |
Linux Linux kernel | =2.2.0 | |
Linux Linux kernel | =2.2.6 | |
Linux Linux kernel | =2.4.12 | |
Linux Linux kernel | =2.4.13 | |
Linux Linux kernel | =2.2.18 | |
Linux Linux kernel | =2.2.3 | |
Linux Linux kernel | =2.4.17 | |
Linux Linux kernel | =2.2.2 | |
Linux Linux kernel | =2.2.5 | |
Linux Linux kernel | =2.4.7 | |
Linux Linux kernel | =2.2.8 | |
Linux Linux kernel | =2.4.9 | |
Linux Linux kernel | =2.2.7 | |
Linux Linux kernel | =2.2.16 | |
Linux Linux kernel | =2.2.1 | |
Linux Linux kernel | =2.2.12 | |
Linux Linux kernel | =2.4.10 | |
Linux Linux kernel | =2.4.0 | |
Linux Linux kernel | =2.4.2 | |
Linux Linux kernel | =2.4.16 | |
Linux Linux kernel | =2.4.8 | |
Linux Linux kernel | =2.4.14 | |
Linux Linux kernel | =2.2.19 | |
Linux Linux kernel | =2.2.20 | |
Linux Linux kernel | =2.4.5 | |
Linux Linux kernel | =2.2.15 | |
Linux Linux kernel | =2.2.4 | |
Linux Linux kernel | =2.4.3 | |
Linux Linux kernel | =2.2.14 | |
Linux Linux kernel | =2.2.11 | |
Linux Linux kernel | =2.4.1 | |
Linux Linux kernel | =2.4.4 | |
Linux Linux kernel | =2.2.17 | |
Linux Linux kernel | =2.4.6 | |
Linux Linux kernel | =2.2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.