[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-relays] OpenSSL Padding oracle in AES-NI CBC MAC check (CVE-2016-2107)
https://www.openssl.org/news/secadv/20160503.txt
In general I understand that padding oracle attacks are principally a
hazard for browser communications. Am assuming that updating OpenSSL
for this fix is not an urgent priority for a Tor Relay.
If anyone knows different please comment.
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays