Vulnerability in encrypted loop device for Linux
Source: Linux Security
The following text describes a security hole in the encrypted loop device for linux. Because of it, an attacker is able to modify the content of the encrypted device without being detected. This text proposes to fix the hole by authenticating the device.