Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S265203AbUAOSQj (ORCPT ); Thu, 15 Jan 2004 13:16:39 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S265205AbUAOSQi (ORCPT ); Thu, 15 Jan 2004 13:16:38 -0500 Received: from nat-pool-bos.redhat.com ([66.187.230.200]:24005 "EHLO thoron.boston.redhat.com") by vger.kernel.org with ESMTP id S265203AbUAOSQf (ORCPT ); Thu, 15 Jan 2004 13:16:35 -0500 Date: Thu, 15 Jan 2004 13:16:21 -0500 (EST) From: James Morris X-X-Sender: jmorris@thoron.boston.redhat.com To: Jari Ruusu cc: Jim Faulkner , , Subject: Re: PROBLEM: AES cryptoloop corruption under recent -mm kernels In-Reply-To: <4006C665.3065DFA1@users.sourceforge.net> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 554 Lines: 21 On Thu, 15 Jan 2004, Jari Ruusu wrote: > Jim, > If you want your data secure, you need to re-encrypt your data anyway. > Mainline loop crypto implementation has exploitable vulnerability that is > equivalent to back door. What exactly is this vulnerability? - James -- James Morris - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/