UbuntuUpdates.org

Package "tor"


Moved to xenial:universe:updates


Name: tor

Description:

anonymizing overlay network for TCP

Latest version: *DELETED*
Release: xenial (16.04)
Level: proposed
Repository: universe
Homepage: https://www.torproject.org/

Links


Download "tor"


Other versions of "tor" in Xenial

Repository Area Version
base universe 0.2.7.6-1ubuntu1
security universe 0.2.9.14-1ubuntu1~16.04.3
updates universe 0.2.9.14-1ubuntu1~16.04.3
PPA: Tor 0.4.8.13-2~xenial+1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: *DELETED* 2018-02-22 18:07:55 UTC
Moved to xenial:universe:updates
No changelog for deleted or moved packages.

Version: 0.2.9.14-1ubuntu1~16.04.1 2018-02-14 02:06:19 UTC

  tor (0.2.9.14-1ubuntu1~16.04.1) xenial; urgency=medium

  [ Peter Palfrader ]
  * apparmor: use Pix instead of PUx for obfs4proxy, giving us
    better confinement of the child process while actually working
    with systemd's NoNewPrivileges. (closes: #867342)
  * Do not rely on aa-exec and aa-enabled being in /usr/sbin in the
    SysV init script. This change enables apparmor confinement
    on some system-V systems again. (closes: #869153)
  * Update apparmor profile: replace CAP_DAC_OVERRIDE with
    CAP_DAC_READ_SEARCH to match the systemd capability bounding set
    changed with 0.3.0.4-rc-1. This change will allow tor to start
    again under apparmor if hidden services are configured.
    Patch by intrigeri. (closes: #862993)
  * Replace CAP_DAC_OVERRIDE with CAP_DAC_READ_SEARCH in systemd's service
    capability bounding set. Read access is sufficient for Tor (as root on
    startup) to check its onion service directories (see #847598).
  * Change "AppArmorProfile=system_tor" to AppArmorProfile=-system_tor,
    causing all errors while switching to the new apparmor profile to
    be ignored. This is not ideal, but for now it's probably the
    best solution. Thanks to intrigeri; closes: #880490.

  [ Simon Deziel ]
  * Backport 0.2.9.14 to 16.04 (LP: #1731698)
  * debian/rules: stop overriding micro-revision.i
  * debian/control: drop build-conflicts
  * debian/control: Limit the seccomp build-dependency to [amd64 i386 x32 armel armhf]
  * Resync with Debian Stretch

1731698 [SRU] Tor 0.2.9.14 and 0.3.0.13
867342 tor: /usr/bin/obfs4proxy fails to load under default combination of apparmor execution permission PUx and systemd NoNewPrivileges=Yes hardening - Deb
869153 tor: CVE-2017-11565: aa-exec is not longer in /usr/sbin and now apparmor is silently scraped - Debian Bug report logs
862993 tor: Does not start with AppArmor enabled and hidden service directory owned by non-root - Debian Bug report logs
880490 tor: Does not start when the AppArmor LSM is enabled but the apparmor package is not installed - Debian Bug report logs

Version: *DELETED* 2017-09-18 20:06:48 UTC
Moved to xenial:universe:updates
No changelog for deleted or moved packages.

Version: 0.2.9.11-1ubuntu1~16.04.1 2017-09-07 19:06:43 UTC
No changelog available yet.



About   -   Send Feedback to @ubuntu_updates