Name: | tor |
---|---|
Version: | 0.3.5.7 |
Release: | 1.el7 |
Architecture: | x86_64 |
Group: | System Environment/Daemons |
Size: | 14488666 |
License: | BSD |
RPM: | tor-0.3.5.7-1.el7.x86_64.rpm |
Source RPM: | tor-0.3.5.7-1.el7.src.rpm |
Build Date: | Thu Jan 24 2019 |
Build Host: | x86-ol7-builder-03.us.oracle.com |
Vendor: | Oracle America |
URL: | https://www.torproject.org |
Summary: | Anonymizing overlay network for TCP |
Description: | The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network. |
- update to latest upstream release
- Update to latest version
- update to latest upstream stable release 0.2.9.16 (#1581512)
- Update to latest version. Security-Fixes TROVE-2018-001, TROVE-2018-002, TROVE-2018-003 and TROVE-2018-004
- update to upstream release 0.2.9.14. Fixes: - CVE-2017-8819: Replay-cache ineffective for v2 onion services - CVE-2017-8820: Remote DoS attack against directory authorities - CVE-2017-8821: An attacker can make Tor ask for a password - CVE-2017-8822: Relays can pick themselves in a circuit path - CVE-2017-8823: Use-after-free in onion service v2
- update to upstream release 0.2.9.13
- update to upstream release 0.2.9.12 (SECURITY) (#1494860) - CVE-2017-0380 Stack disclosure in hidden services logs when SafeLogging disabled (#1493512) (#1493513) - Cleanup spec
- update to upstream release 0.2.9.11 (SECURITY) - CVE-2017-0375 & CVE-2017-0376: denial of service (assertion failure and daemon exit) (#1461276) (#1461275)
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild