outdated Tor version in Fedora (missing security fixes)

Christoph A. casmls at gmail.com
Thu Jun 9 18:19:03 UTC 2011


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 06/07/2011 04:06 PM, Fennix wrote:
> Umm, you could just download the source file and compile yourself...

Yes, *I* could, but if Fedora ships a vulnerable package this affects a
lot more people then just me.

Compiling is always a possibility but the last one I would choose.
F14 contains latest stable (0.2.1.30) now and in future I (and hopefully
others) will give some karma to Enricos packages :)

> I always compile the latest alpha/beta and the current is 0.2.2.27-beta
> which is working perfectly well for me.

Actually it is 0.2.2.28-beta
https://lists.torproject.org/pipermail/tor-talk/2011-June/020596.html

You don't have to compile, you can use unofficial repos if you want Tor
0.2.2.x.
http://deb.torproject.org/torproject.org/rpm/fc14-experimental/
(packages usually take some time after the a new Tor version was released)
I don't use the unofficial packages because I don't know if they fit
with the SELinux policy.

Does your self compiled tor daemon run in tor_t?
-----BEGIN PGP SIGNATURE-----

iEYEAREKAAYFAk3xDpYACgkQrq+riTAIEg1z8QCgr003z4iMy1wWhw9Nsy2br0Rq
3jgAoL51/5scy+ujPPGGwLRkorp32iaf
=iZvi
-----END PGP SIGNATURE-----


More information about the users mailing list