From ${URL} : In Tor before 0.3.3.12, 0.3.4.x before 0.3.4.11, 0.3.5.x before 0.3.5.8, and 0.4.x before 0.4.0.2-alpha, remote denial of service against Tor clients and relays can occur via memory exhaustion in the KIST cell scheduler. References: https://blog.torproject.org/new-releases-tor-0402-alpha-0358-03411-and-03312 https://trac.torproject.org/projects/tor/ticket/29168 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
*** Bug 678700 has been marked as a duplicate of this bug. ***
@arch teams, please stabilize =net-vpn/tor-0.3.5.8 KEYWORDS="amd64 arm ppc ppc64 x86"
amd64 stable
ppc stable
ppc64 stable
arm stable
x86 stable
The older versions are off the tree.