light cleanup, give them new blurbs
This commit is contained in:
parent
37b7eadb57
commit
78fcfc7bcd
54
ChangeLog
54
ChangeLog
|
@ -2,22 +2,21 @@ Changes in version 0.3.3.6 - 2018-05-22
|
||||||
Tor 0.3.3.6 is the first stable release in the 0.3.3 series. It
|
Tor 0.3.3.6 is the first stable release in the 0.3.3 series. It
|
||||||
backports several important fixes from the 0.3.4.1-alpha.
|
backports several important fixes from the 0.3.4.1-alpha.
|
||||||
|
|
||||||
The Tor 0.3.3 series includes several important features, including
|
The Tor 0.3.3 series includes controller support and other improvements
|
||||||
improved denial-of-service resistance, controller support and other
|
for v3 onion services, official support for embedding Tor within
|
||||||
improvements for v3 onion services, and official support for embedding
|
other applications, and our first non-trivial module written in the
|
||||||
Tor within other applications. It also include our first non-trivial
|
Rust programming language. (Rust is still not enabled by default when
|
||||||
module written in the Rust programming language. (Rust is still not
|
building Tor.) And as usual, there are numerous other smaller bugfixes,
|
||||||
enabled by default when building Tor.) And as usual, there are
|
features, and improvements.
|
||||||
numerous other smaller bugfixes, features, and improvements.
|
|
||||||
|
|
||||||
Below are the changes since 0.3.3.5-rc. For a list of all changes
|
Below are the changes since 0.3.3.5-rc. For a list of all changes
|
||||||
since 0.3.2, see the ReleaseNotes file.
|
since 0.3.2.10, see the ReleaseNotes file.
|
||||||
|
|
||||||
o Major bugfixes (security, directory authority, denial-of-service):
|
o Major bugfixes (security, directory authority, denial-of-service):
|
||||||
- Fix a bug that could have allowed an attacker to force a
|
- Fix a bug that could have allowed an attacker to force a
|
||||||
directory authority to use up all its RAM by passing it a
|
directory authority to use up all its RAM by passing it a
|
||||||
maliciously crafted protocol versions string. Fixes bug 25517;
|
maliciously crafted protocol versions string. Fixes bug 25517;
|
||||||
bugfix on 0.2.9.4-alpha. This issue is also tracked as
|
bugfix on 0.2.9.4-alpha. This issue is also tracked as
|
||||||
TROVE-2018-005.
|
TROVE-2018-005.
|
||||||
|
|
||||||
o Major bugfixes (directory authorities, security, backport from 0.3.4.1-alpha):
|
o Major bugfixes (directory authorities, security, backport from 0.3.4.1-alpha):
|
||||||
|
@ -41,8 +40,9 @@ Changes in version 0.3.3.6 - 2018-05-22
|
||||||
Fixes bug 25761; bugfix on 0.3.2.1.
|
Fixes bug 25761; bugfix on 0.3.2.1.
|
||||||
|
|
||||||
o Major bugfixes (relay, denial of service, backport from 0.3.4.1-alpha):
|
o Major bugfixes (relay, denial of service, backport from 0.3.4.1-alpha):
|
||||||
- Impose a limit on circuit cell queue size. The limit can be controlled by
|
- Impose a limit on circuit cell queue size. The limit can be
|
||||||
a consensus parameter. Fixes bug 25226; bugfix on 0.2.4.14-alpha.
|
controlled by a consensus parameter. Fixes bug 25226; bugfix on
|
||||||
|
0.2.4.14-alpha.
|
||||||
|
|
||||||
o Minor features (compatibility, backport from 0.3.4.1-alpha):
|
o Minor features (compatibility, backport from 0.3.4.1-alpha):
|
||||||
- Avoid some compilation warnings with recent versions
|
- Avoid some compilation warnings with recent versions
|
||||||
|
@ -51,7 +51,7 @@ Changes in version 0.3.3.6 - 2018-05-22
|
||||||
o Minor features (continuous integration, backport from 0.3.4.1-alpha):
|
o Minor features (continuous integration, backport from 0.3.4.1-alpha):
|
||||||
- Our .travis.yml configuration now includes support for testing
|
- Our .travis.yml configuration now includes support for testing
|
||||||
the results of "make distcheck". (It's not uncommon for "make check" to
|
the results of "make distcheck". (It's not uncommon for "make check" to
|
||||||
pass but "make distcheck" to fail.) Closes ticket 25814.
|
pass but "make distcheck" to fail.) Closes ticket 25814.
|
||||||
- Our Travis CI configuration now integrates with the Coveralls coverage
|
- Our Travis CI configuration now integrates with the Coveralls coverage
|
||||||
analysis tool. Closes ticket 25818.
|
analysis tool. Closes ticket 25818.
|
||||||
|
|
||||||
|
@ -66,7 +66,7 @@ Changes in version 0.3.3.6 - 2018-05-22
|
||||||
|
|
||||||
o Minor bugfixes (correctness, client, backport from 0.3.4.1-alpha):
|
o Minor bugfixes (correctness, client, backport from 0.3.4.1-alpha):
|
||||||
- Upon receiving a malformed connected cell, stop processing the cell
|
- Upon receiving a malformed connected cell, stop processing the cell
|
||||||
immediately. Previously we would mark the connection for close, but
|
immediately. Previously we would mark the connection for close, but
|
||||||
continue processing the cell as if the connection were open. Fixes bug
|
continue processing the cell as if the connection were open. Fixes bug
|
||||||
26072; bugfix on 0.2.4.7-alpha.
|
26072; bugfix on 0.2.4.7-alpha.
|
||||||
|
|
||||||
|
@ -95,7 +95,7 @@ Changes in version 0.3.3.6 - 2018-05-22
|
||||||
|
|
||||||
o Documentation (backport from 0.3.4.1-alpha):
|
o Documentation (backport from 0.3.4.1-alpha):
|
||||||
- Correct an IPv6 error in the documentation for ExitPolicy.
|
- Correct an IPv6 error in the documentation for ExitPolicy.
|
||||||
Closes ticket 25857. Patch from "CTassisF".
|
Closes ticket 25857. Patch from "CTassisF".
|
||||||
|
|
||||||
|
|
||||||
Changes in version 0.3.3.5-rc - 2018-04-15
|
Changes in version 0.3.3.5-rc - 2018-04-15
|
||||||
|
@ -295,7 +295,7 @@ Changes in version 0.3.2.10 - 2018-03-03
|
||||||
upgraded: Bug 24700, which was fixed in 0.3.3.2-alpha, can be remotely
|
upgraded: Bug 24700, which was fixed in 0.3.3.2-alpha, can be remotely
|
||||||
triggered in order to crash relays with a use-after-free pattern. As
|
triggered in order to crash relays with a use-after-free pattern. As
|
||||||
such, we are now tracking that bug as TROVE-2018-002 and
|
such, we are now tracking that bug as TROVE-2018-002 and
|
||||||
CVE-2018-0491, and backporting it to earlier releases. This bug
|
CVE-2018-0491, and backporting it to earlier releases. This bug
|
||||||
affected versions 0.3.2.1-alpha through 0.3.2.9, as well as version
|
affected versions 0.3.2.1-alpha through 0.3.2.9, as well as version
|
||||||
0.3.3.1-alpha.
|
0.3.3.1-alpha.
|
||||||
|
|
||||||
|
@ -306,7 +306,7 @@ Changes in version 0.3.2.10 - 2018-03-03
|
||||||
earlier releases.
|
earlier releases.
|
||||||
|
|
||||||
Relays running 0.3.2.x SHOULD upgrade to one of the versions released
|
Relays running 0.3.2.x SHOULD upgrade to one of the versions released
|
||||||
today, for the fix to TROVE-2018-002. Directory authorities should
|
today, for the fix to TROVE-2018-002. Directory authorities should
|
||||||
also upgrade. (Relays on earlier versions might want to update too for
|
also upgrade. (Relays on earlier versions might want to update too for
|
||||||
the DoS mitigations.)
|
the DoS mitigations.)
|
||||||
|
|
||||||
|
@ -434,7 +434,7 @@ Changes in version 0.3.2.10 - 2018-03-03
|
||||||
o Minor bugfixes (spec conformance, backport from 0.3.3.3-alpha):
|
o Minor bugfixes (spec conformance, backport from 0.3.3.3-alpha):
|
||||||
- Forbid "-0" as a protocol version. Fixes part of bug 25249; bugfix on
|
- Forbid "-0" as a protocol version. Fixes part of bug 25249; bugfix on
|
||||||
0.2.9.4-alpha.
|
0.2.9.4-alpha.
|
||||||
- Forbid UINT32_MAX as a protocol version. Fixes part of bug 25249;
|
- Forbid UINT32_MAX as a protocol version. Fixes part of bug 25249;
|
||||||
bugfix on 0.2.9.4-alpha.
|
bugfix on 0.2.9.4-alpha.
|
||||||
|
|
||||||
o Minor bugfixes (testing, backport from 0.3.3.1-alpha):
|
o Minor bugfixes (testing, backport from 0.3.3.1-alpha):
|
||||||
|
@ -463,7 +463,7 @@ Changes in version 0.3.3.3-alpha - 2018-03-03
|
||||||
against directory authorities tracked as TROVE-2018-001.
|
against directory authorities tracked as TROVE-2018-001.
|
||||||
|
|
||||||
Additionally, with this release, we are upgrading the severity of a
|
Additionally, with this release, we are upgrading the severity of a
|
||||||
bug fixed in 0.3.3.2-alpha. Bug 24700, which was fixed in
|
bug fixed in 0.3.3.2-alpha. Bug 24700, which was fixed in
|
||||||
0.3.3.2-alpha, can be remotely triggered in order to crash relays with
|
0.3.3.2-alpha, can be remotely triggered in order to crash relays with
|
||||||
a use-after-free pattern. As such, we are now tracking that bug as
|
a use-after-free pattern. As such, we are now tracking that bug as
|
||||||
TROVE-2018-002 and CVE-2018-0491. This bug affected versions
|
TROVE-2018-002 and CVE-2018-0491. This bug affected versions
|
||||||
|
@ -473,7 +473,7 @@ Changes in version 0.3.3.3-alpha - 2018-03-03
|
||||||
earlier releases.
|
earlier releases.
|
||||||
|
|
||||||
Relays running 0.3.2.x should upgrade to one of the versions released
|
Relays running 0.3.2.x should upgrade to one of the versions released
|
||||||
today, for the fix to TROVE-2018-002. Directory authorities should
|
today, for the fix to TROVE-2018-002. Directory authorities should
|
||||||
also upgrade. (Relays on earlier versions might want to update too for
|
also upgrade. (Relays on earlier versions might want to update too for
|
||||||
the DoS mitigations.)
|
the DoS mitigations.)
|
||||||
|
|
||||||
|
@ -529,7 +529,7 @@ Changes in version 0.3.3.3-alpha - 2018-03-03
|
||||||
o Minor bugfixes (spec conformance):
|
o Minor bugfixes (spec conformance):
|
||||||
- Forbid "-0" as a protocol version. Fixes part of bug 25249; bugfix on
|
- Forbid "-0" as a protocol version. Fixes part of bug 25249; bugfix on
|
||||||
0.2.9.4-alpha.
|
0.2.9.4-alpha.
|
||||||
- Forbid UINT32_MAX as a protocol version. Fixes part of bug 25249;
|
- Forbid UINT32_MAX as a protocol version. Fixes part of bug 25249;
|
||||||
bugfix on 0.2.9.4-alpha.
|
bugfix on 0.2.9.4-alpha.
|
||||||
|
|
||||||
o Minor bugfixes (spec conformance, rust):
|
o Minor bugfixes (spec conformance, rust):
|
||||||
|
@ -715,12 +715,12 @@ Changes in version 0.3.3.1-alpha - 2018-01-25
|
||||||
o Major features (IPv6, directory documents):
|
o Major features (IPv6, directory documents):
|
||||||
- Add consensus method 27, which adds IPv6 ORPorts to the microdesc
|
- Add consensus method 27, which adds IPv6 ORPorts to the microdesc
|
||||||
consensus. This information makes it easier for IPv6 clients to
|
consensus. This information makes it easier for IPv6 clients to
|
||||||
bootstrap and choose reachable entry guards. Implements 23826.
|
bootstrap and choose reachable entry guards. Implements ticket 23826.
|
||||||
- Add consensus method 28, which removes IPv6 ORPorts from
|
- Add consensus method 28, which removes IPv6 ORPorts from
|
||||||
microdescriptors. Now that the consensus contains IPv6 ORPorts,
|
microdescriptors. Now that the consensus contains IPv6 ORPorts, they
|
||||||
they are redundant in microdescs. This change will be used by Tor
|
are redundant in microdescs. This change will be used by Tor clients
|
||||||
clients on 0.2.8.x and later. (That is to say, with all Tor
|
on 0.2.8.x and later. (That is to say, with all Tor clients that
|
||||||
clients having IPv6 bootstrap and guard support.) Implements 23828.
|
have IPv6 bootstrap and guard support.) Implements ticket 23828.
|
||||||
- Expand the documentation for AuthDirHasIPv6Connectivity when it is
|
- Expand the documentation for AuthDirHasIPv6Connectivity when it is
|
||||||
set by different numbers of authorities. Fixes 23870
|
set by different numbers of authorities. Fixes 23870
|
||||||
on 0.2.4.1-alpha.
|
on 0.2.4.1-alpha.
|
||||||
|
@ -804,8 +804,8 @@ Changes in version 0.3.3.1-alpha - 2018-01-25
|
||||||
- Where possible, the tor_free() macro now only evaluates its input
|
- Where possible, the tor_free() macro now only evaluates its input
|
||||||
once. Part of ticket 24337.
|
once. Part of ticket 24337.
|
||||||
- Check that microdesc ed25519 ids are non-zero in
|
- Check that microdesc ed25519 ids are non-zero in
|
||||||
node_get_ed25519_id() before returning them. Implements 24001,
|
node_get_ed25519_id() before returning them. Implements ticket
|
||||||
patch by "aruna1234".
|
24001, patch by "aruna1234".
|
||||||
|
|
||||||
o Minor features (directory authority):
|
o Minor features (directory authority):
|
||||||
- Make the "Exit" flag assignment only depend on whether the exit
|
- Make the "Exit" flag assignment only depend on whether the exit
|
||||||
|
|
48
ReleaseNotes
48
ReleaseNotes
|
@ -6,15 +6,14 @@ Changes in version 0.3.3.6 - 2018-05-22
|
||||||
Tor 0.3.3.6 is the first stable release in the 0.3.3 series. It
|
Tor 0.3.3.6 is the first stable release in the 0.3.3 series. It
|
||||||
backports several important fixes from the 0.3.4.1-alpha.
|
backports several important fixes from the 0.3.4.1-alpha.
|
||||||
|
|
||||||
The Tor 0.3.3 series includes several important features, including
|
The Tor 0.3.3 series includes controller support and other improvements
|
||||||
controller support and other
|
for v3 onion services, official support for embedding Tor within
|
||||||
improvements for v3 onion services, and official support for embedding
|
other applications, and our first non-trivial module written in the
|
||||||
Tor within other applications. It also include our first non-trivial
|
Rust programming language. (Rust is still not enabled by default when
|
||||||
module written in the Rust programming language. (Rust is still not
|
building Tor.) And as usual, there are numerous other smaller bugfixes,
|
||||||
enabled by default when building Tor.) And as usual, there are
|
features, and improvements.
|
||||||
numerous other smaller bugfixes, features, and improvements.
|
|
||||||
|
|
||||||
Below are the changes since the 0.3.2 series. For a list of only the changes
|
Below are the changes since 0.3.2.10. For a list of only the changes
|
||||||
since 0.3.3.5-rc, see the ChangeLog file.
|
since 0.3.3.5-rc, see the ChangeLog file.
|
||||||
|
|
||||||
o New system requirements:
|
o New system requirements:
|
||||||
|
@ -25,7 +24,7 @@ Changes in version 0.3.3.6 - 2018-05-22
|
||||||
- Fix a bug that could have allowed an attacker to force a
|
- Fix a bug that could have allowed an attacker to force a
|
||||||
directory authority to use up all its RAM by passing it a
|
directory authority to use up all its RAM by passing it a
|
||||||
maliciously crafted protocol versions string. Fixes bug 25517;
|
maliciously crafted protocol versions string. Fixes bug 25517;
|
||||||
bugfix on 0.2.9.4-alpha. This issue is also tracked as
|
bugfix on 0.2.9.4-alpha. This issue is also tracked as
|
||||||
TROVE-2018-005.
|
TROVE-2018-005.
|
||||||
|
|
||||||
o Major features (embedding):
|
o Major features (embedding):
|
||||||
|
@ -42,12 +41,12 @@ Changes in version 0.3.3.6 - 2018-05-22
|
||||||
o Major features (IPv6, directory documents):
|
o Major features (IPv6, directory documents):
|
||||||
- Add consensus method 27, which adds IPv6 ORPorts to the microdesc
|
- Add consensus method 27, which adds IPv6 ORPorts to the microdesc
|
||||||
consensus. This information makes it easier for IPv6 clients to
|
consensus. This information makes it easier for IPv6 clients to
|
||||||
bootstrap and choose reachable entry guards. Implements 23826.
|
bootstrap and choose reachable entry guards. Implements ticket 23826.
|
||||||
- Add consensus method 28, which removes IPv6 ORPorts from
|
- Add consensus method 28, which removes IPv6 ORPorts from
|
||||||
microdescriptors. Now that the consensus contains IPv6 ORPorts,
|
microdescriptors. Now that the consensus contains IPv6 ORPorts, they
|
||||||
they are redundant in microdescs. This change will be used by Tor
|
are redundant in microdescs. This change will be used by Tor clients
|
||||||
clients on 0.2.8.x and later. (That is to say, with all Tor
|
on 0.2.8.x and later. (That is to say, with all Tor clients that
|
||||||
clients having IPv6 bootstrap and guard support.) Implements 23828.
|
have IPv6 bootstrap and guard support.) Implements ticket 23828.
|
||||||
- Expand the documentation for AuthDirHasIPv6Connectivity when it is
|
- Expand the documentation for AuthDirHasIPv6Connectivity when it is
|
||||||
set by different numbers of authorities. Fixes 23870
|
set by different numbers of authorities. Fixes 23870
|
||||||
on 0.2.4.1-alpha.
|
on 0.2.4.1-alpha.
|
||||||
|
@ -128,8 +127,9 @@ Changes in version 0.3.3.6 - 2018-05-22
|
||||||
occurred. Fixes bug 24767; bugfix on 0.0.6.
|
occurred. Fixes bug 24767; bugfix on 0.0.6.
|
||||||
|
|
||||||
o Major bugfixes (relay, denial of service, backport from 0.3.4.1-alpha):
|
o Major bugfixes (relay, denial of service, backport from 0.3.4.1-alpha):
|
||||||
- Impose a limit on circuit cell queue size. The limit can be controlled by
|
- Impose a limit on circuit cell queue size. The limit can be
|
||||||
a consensus parameter. Fixes bug 25226; bugfix on 0.2.4.14-alpha.
|
controlled by a consensus parameter. Fixes bug 25226; bugfix on
|
||||||
|
0.2.4.14-alpha.
|
||||||
|
|
||||||
o Minor features (cleanup):
|
o Minor features (cleanup):
|
||||||
- Tor now deletes the CookieAuthFile and ExtORPortCookieAuthFile
|
- Tor now deletes the CookieAuthFile and ExtORPortCookieAuthFile
|
||||||
|
@ -152,7 +152,7 @@ Changes in version 0.3.3.6 - 2018-05-22
|
||||||
o Minor features (continuous integration, backport from 0.3.4.1-alpha):
|
o Minor features (continuous integration, backport from 0.3.4.1-alpha):
|
||||||
- Our .travis.yml configuration now includes support for testing
|
- Our .travis.yml configuration now includes support for testing
|
||||||
the results of "make distcheck". (It's not uncommon for "make check" to
|
the results of "make distcheck". (It's not uncommon for "make check" to
|
||||||
pass but "make distcheck" to fail.) Closes ticket 25814.
|
pass but "make distcheck" to fail.) Closes ticket 25814.
|
||||||
- Our Travis CI configuration now integrates with the Coveralls coverage
|
- Our Travis CI configuration now integrates with the Coveralls coverage
|
||||||
analysis tool. Closes ticket 25818.
|
analysis tool. Closes ticket 25818.
|
||||||
|
|
||||||
|
@ -164,8 +164,8 @@ Changes in version 0.3.3.6 - 2018-05-22
|
||||||
- Where possible, the tor_free() macro now only evaluates its input
|
- Where possible, the tor_free() macro now only evaluates its input
|
||||||
once. Part of ticket 24337.
|
once. Part of ticket 24337.
|
||||||
- Check that microdesc ed25519 ids are non-zero in
|
- Check that microdesc ed25519 ids are non-zero in
|
||||||
node_get_ed25519_id() before returning them. Implements 24001,
|
node_get_ed25519_id() before returning them. Implements ticket
|
||||||
patch by "aruna1234".
|
24001, patch by "aruna1234".
|
||||||
|
|
||||||
o Minor features (directory authority):
|
o Minor features (directory authority):
|
||||||
- When directory authorities are unable to add signatures to a
|
- When directory authorities are unable to add signatures to a
|
||||||
|
@ -379,7 +379,7 @@ Changes in version 0.3.3.6 - 2018-05-22
|
||||||
|
|
||||||
o Minor bugfixes (correctness, client, backport from 0.3.4.1-alpha):
|
o Minor bugfixes (correctness, client, backport from 0.3.4.1-alpha):
|
||||||
- Upon receiving a malformed connected cell, stop processing the cell
|
- Upon receiving a malformed connected cell, stop processing the cell
|
||||||
immediately. Previously we would mark the connection for close, but
|
immediately. Previously we would mark the connection for close, but
|
||||||
continue processing the cell as if the connection were open. Fixes bug
|
continue processing the cell as if the connection were open. Fixes bug
|
||||||
26072; bugfix on 0.2.4.7-alpha.
|
26072; bugfix on 0.2.4.7-alpha.
|
||||||
|
|
||||||
|
@ -629,7 +629,7 @@ Changes in version 0.3.3.6 - 2018-05-22
|
||||||
|
|
||||||
o Documentation (backport from 0.3.4.1-alpha):
|
o Documentation (backport from 0.3.4.1-alpha):
|
||||||
- Correct an IPv6 error in the documentation for ExitPolicy.
|
- Correct an IPv6 error in the documentation for ExitPolicy.
|
||||||
Closes ticket 25857. Patch from "CTassisF".
|
Closes ticket 25857. Patch from "CTassisF".
|
||||||
|
|
||||||
o Documentation (man page):
|
o Documentation (man page):
|
||||||
- The HiddenServiceVersion torrc option accepts only one number:
|
- The HiddenServiceVersion torrc option accepts only one number:
|
||||||
|
@ -654,7 +654,7 @@ Changes in version 0.3.2.10 - 2018-03-03
|
||||||
upgraded: Bug 24700, which was fixed in 0.3.3.2-alpha, can be remotely
|
upgraded: Bug 24700, which was fixed in 0.3.3.2-alpha, can be remotely
|
||||||
triggered in order to crash relays with a use-after-free pattern. As
|
triggered in order to crash relays with a use-after-free pattern. As
|
||||||
such, we are now tracking that bug as TROVE-2018-002 and
|
such, we are now tracking that bug as TROVE-2018-002 and
|
||||||
CVE-2018-0491, and backporting it to earlier releases. This bug
|
CVE-2018-0491, and backporting it to earlier releases. This bug
|
||||||
affected versions 0.3.2.1-alpha through 0.3.2.9, as well as version
|
affected versions 0.3.2.1-alpha through 0.3.2.9, as well as version
|
||||||
0.3.3.1-alpha.
|
0.3.3.1-alpha.
|
||||||
|
|
||||||
|
@ -665,7 +665,7 @@ Changes in version 0.3.2.10 - 2018-03-03
|
||||||
earlier releases.
|
earlier releases.
|
||||||
|
|
||||||
Relays running 0.3.2.x SHOULD upgrade to one of the versions released
|
Relays running 0.3.2.x SHOULD upgrade to one of the versions released
|
||||||
today, for the fix to TROVE-2018-002. Directory authorities should
|
today, for the fix to TROVE-2018-002. Directory authorities should
|
||||||
also upgrade. (Relays on earlier versions might want to update too for
|
also upgrade. (Relays on earlier versions might want to update too for
|
||||||
the DoS mitigations.)
|
the DoS mitigations.)
|
||||||
|
|
||||||
|
@ -793,7 +793,7 @@ Changes in version 0.3.2.10 - 2018-03-03
|
||||||
o Minor bugfixes (spec conformance, backport from 0.3.3.3-alpha):
|
o Minor bugfixes (spec conformance, backport from 0.3.3.3-alpha):
|
||||||
- Forbid "-0" as a protocol version. Fixes part of bug 25249; bugfix on
|
- Forbid "-0" as a protocol version. Fixes part of bug 25249; bugfix on
|
||||||
0.2.9.4-alpha.
|
0.2.9.4-alpha.
|
||||||
- Forbid UINT32_MAX as a protocol version. Fixes part of bug 25249;
|
- Forbid UINT32_MAX as a protocol version. Fixes part of bug 25249;
|
||||||
bugfix on 0.2.9.4-alpha.
|
bugfix on 0.2.9.4-alpha.
|
||||||
|
|
||||||
o Minor bugfixes (testing, backport from 0.3.3.1-alpha):
|
o Minor bugfixes (testing, backport from 0.3.3.1-alpha):
|
||||||
|
|
Loading…
Reference in New Issue