[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-relays] OpenSSL Padding oracle in AES-NI CBC MAC check (CVE-2016-2107)



https://www.openssl.org/news/secadv/20160503.txt

In general I understand that padding oracle attacks are principally a
hazard for browser communications.  Am assuming that updating OpenSSL
for this fix is not an urgent priority for a Tor Relay.

If anyone knows different please comment.
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays