[tor-relays] most (>57% cwfr) of the tor network still vulnerable to CVE-2016-8860 - update your relay!

nusenu nusenu at openmailbox.org
Wed Oct 26 07:54:00 UTC 2016



nusenu:
> CentOS/RHEL/Fedora
> ===================
> 
> yum install --enablerepo=epel-testing tor

correction:

CentOS/RHEL
yum upgrade --enablerepo=epel-testing tor

fedora:
dnf upgrade --enablerepo=updates-testing tor

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20161026/fbc5c00c/attachment.sig>


More information about the tor-relays mailing list