Package "tor"

Moved to xenial:universe:updates

Name: tor


anonymizing overlay network for TCP

Latest version: *DELETED*
Release: xenial (16.04)
Level: proposed
Repository: universe
Homepage: https://www.torproject.org/


Save this URL for the latest version of "tor": https://www.ubuntuupdates.org/tor

Download "tor"

Other versions of "tor" in Xenial

Repository Area Version
base universe
security universe
updates universe
PPA: Tor

Packages in group

Deleted packages are displayed in grey.


Version: *DELETED* 2018-02-22 18:07:55 UTC
Moved to xenial:universe:updates
No changelog for deleted or moved packages.

Version: 2018-02-14 02:06:19 UTC

  tor ( xenial; urgency=medium

  [ Peter Palfrader ]
  * apparmor: use Pix instead of PUx for obfs4proxy, giving us
    better confinement of the child process while actually working
    with systemd's NoNewPrivileges. (closes: #867342)
  * Do not rely on aa-exec and aa-enabled being in /usr/sbin in the
    SysV init script. This change enables apparmor confinement
    on some system-V systems again. (closes: #869153)
  * Update apparmor profile: replace CAP_DAC_OVERRIDE with
    CAP_DAC_READ_SEARCH to match the systemd capability bounding set
    changed with This change will allow tor to start
    again under apparmor if hidden services are configured.
    Patch by intrigeri. (closes: #862993)
  * Replace CAP_DAC_OVERRIDE with CAP_DAC_READ_SEARCH in systemd's service
    capability bounding set. Read access is sufficient for Tor (as root on
    startup) to check its onion service directories (see #847598).
  * Change "AppArmorProfile=system_tor" to AppArmorProfile=-system_tor,
    causing all errors while switching to the new apparmor profile to
    be ignored. This is not ideal, but for now it's probably the
    best solution. Thanks to intrigeri; closes: #880490.

  [ Simon Deziel ]
  * Backport to 16.04 (LP: #1731698)
  * debian/rules: stop overriding micro-revision.i
  * debian/control: drop build-conflicts
  * debian/control: Limit the seccomp build-dependency to [amd64 i386 x32 armel armhf]
  * Resync with Debian Stretch

1731698 [SRU] Tor and
867342 tor: /usr/bin/obfs4proxy fails to load under default combination of apparmor execution permission PUx and systemd NoNewPrivileges=Yes hardening - Deb
869153 tor: CVE-2017-11565: aa-exec is not longer in /usr/sbin and now apparmor is silently scraped - Debian Bug report logs
862993 tor: Does not start with AppArmor enabled and hidden service directory owned by non-root - Debian Bug report logs
880490 tor: Does not start when the AppArmor LSM is enabled but the apparmor package is not installed - Debian Bug report logs

Version: *DELETED* 2017-09-18 20:06:48 UTC
Moved to xenial:universe:updates
No changelog for deleted or moved packages.

Version: 2017-09-07 19:06:43 UTC
No changelog available yet.

About   -   Send Feedback to @ubuntu_updates