tor

Description:Anonymizing overlay network for TCP
Homepage:https://www.torproject.org/ https://gitlab.torproject.org/tpo/core/tor/
Location:Portage
Legend:
  • + - stable
  • ~ - unstable
  • M - hardmask
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
9999 diff - - - - - - - - - - - - -
0.4.8.7 diff - ~ ~ ~ - - ~ ~ ~ - - ~ ~
0.4.8.6 diff - ~ ~ ~ - - ~ ~ ~ - - ~ ~
0.4.7.15 diff - ~ ~ ~ - - ~ ~ ~ - - ~ ~
0.4.7.14 diff - + ~ ~ - - ~ + + - - ~ +
0.4.7.13-r1 - + + ~ - - ~ + + - - ~ +

USE flags

  • caps - Use Linux capabilities library to control privilege
  • doc - Add extra documentation (API, Javadoc, etc). It is recommended to enable per package instead of globally
  • lzma - Support for LZMA (de)compression algorithm
  • man - Build and install man pages
  • scrypt - Use app-crypt/libscrypt for the scrypt algorithm
  • seccomp - Enable seccomp (secure computing mode) to perform system call filtering at runtime to increase security of programs
  • selinux - !!internal use only!! Security Enhanced Linux support, this must be set by the selinux profile or breakage will occur
  • server - Enable tor's relay module so it can operate as a relay/bridge/authority
  • systemd - Enable use of systemd-specific libraries and features like socket activation or session tracking
  • test - Enable dependencies and/or preparations necessary to run tests (usually controlled by FEATURES=test but can be toggled independently)
  • tor-hardening - Compile tor with hardening on vanilla compilers/linkers
  • verify-sig - Verify upstream signatures on distfiles
  • zstd - Enable support for ZSTD compression

Security Advisory

Date Severity Title
11 months normal Tor: Multiple Vulnerabilities
over 2 years normal Tor: Multiple vulnerabilities
about 4 years low Tor: Multiple vulnerabilities

Also available in: Atom

Thank you!