Compare commits
22 Commits
master
...
release-0.
Author | SHA1 | Date |
---|---|---|
Nick Mathewson | b05bb04a82 | |
Nick Mathewson | b45500c6c2 | |
Nick Mathewson | e2ea9ad4db | |
Nick Mathewson | 60a926f674 | |
Nick Mathewson | 0832f1cb8f | |
Nick Mathewson | a8fcb6aa1a | |
Nick Mathewson | 37dabc0274 | |
Nick Mathewson | adc9983483 | |
Nick Mathewson | 3db01d3b56 | |
Nick Mathewson | 2c57e3e5e9 | |
Nick Mathewson | 1f4108805c | |
Nick Mathewson | 121105735c | |
Nick Mathewson | d0d9afa5f9 | |
Nick Mathewson | 82ce0be921 | |
Nick Mathewson | f2df0fc887 | |
Nick Mathewson | ae0586ff89 | |
Nick Mathewson | da819deb56 | |
Nick Mathewson | 01a00d0f94 | |
Nick Mathewson | 1fe5097132 | |
Nick Mathewson | 680d940298 | |
Nick Mathewson | 9da2c9954d | |
Nick Mathewson | 4496301aa7 |
111
ChangeLog
111
ChangeLog
|
@ -1,3 +1,114 @@
|
|||
Changes in version 0.2.7.8 - 2017-06-08
|
||||
Tor 0.2.7.8 backports a fix for a bug that would allow an attacker to
|
||||
remotely crash a hidden service with an assertion failure. Anyone
|
||||
running a hidden service should upgrade to this version, or to some
|
||||
other version with fixes for TROVE-2017-005. (Versions before 0.3.0
|
||||
are not affected by TROVE-2017-004.)
|
||||
|
||||
o Major bugfixes (hidden service, relay, security):
|
||||
- Fix a remotely triggerable assertion failure caused by receiving a
|
||||
BEGIN_DIR cell on a hidden service rendezvous circuit. Fixes bug
|
||||
22494, tracked as TROVE-2017-005 and CVE-2017-0376; bugfix
|
||||
on 0.2.2.1-alpha.
|
||||
|
||||
o Minor features (geoip):
|
||||
- Update geoip and geoip6 to the May 2 2017 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
||||
o Minor bugfixes (correctness):
|
||||
- Avoid undefined behavior when parsing IPv6 entries from the geoip6
|
||||
file. Fixes bug 22490; bugfix on 0.2.4.6-alpha.
|
||||
|
||||
|
||||
Changes in version 0.2.7.7 - 2017-03-03
|
||||
Tor 0.2.7.7 backports a number of security fixes from later Tor
|
||||
releases. Anybody running Tor 0.2.7.6 or earlier should upgrade to
|
||||
this release, if for some reason they cannot upgrade to a later
|
||||
release series.
|
||||
|
||||
Note that support for Tor 0.2.7.x is ending this year: we will not issue
|
||||
any fixes for the Tor 0.2.7.x series after 1 August 2017. If you need
|
||||
a Tor release series with longer-term support, we recommend Tor 0.2.9.x.
|
||||
|
||||
o Directory authority changes (backport from 0.2.8.5-rc):
|
||||
- Urras is no longer a directory authority. Closes ticket 19271.
|
||||
|
||||
o Directory authority changes (backport from 0.2.9.2-alpha):
|
||||
- The "Tonga" bridge authority has been retired; the new bridge
|
||||
authority is "Bifroest". Closes tickets 19728 and 19690.
|
||||
|
||||
o Directory authority key updates (backport from 0.2.8.1-alpha):
|
||||
- Update the V3 identity key for the dannenberg directory authority:
|
||||
it was changed on 18 November 2015. Closes task 17906. Patch
|
||||
by "teor".
|
||||
|
||||
o Major bugfixes (parsing, security, backport from 0.2.9.8):
|
||||
- Fix a bug in parsing that could cause clients to read a single
|
||||
byte past the end of an allocated region. This bug could be used
|
||||
to cause hardened clients (built with --enable-expensive-hardening)
|
||||
to crash if they tried to visit a hostile hidden service. Non-
|
||||
hardened clients are only affected depending on the details of
|
||||
their platform's memory allocator. Fixes bug 21018; bugfix on
|
||||
0.2.0.8-alpha. Found by using libFuzzer. Also tracked as TROVE-
|
||||
2016-12-002 and as CVE-2016-1254.
|
||||
|
||||
o Major bugfixes (security, client, DNS proxy, backport from 0.2.8.3-alpha):
|
||||
- Stop a crash that could occur when a client running with DNSPort
|
||||
received a query with multiple address types, and the first
|
||||
address type was not supported. Found and fixed by Scott Dial.
|
||||
Fixes bug 18710; bugfix on 0.2.5.4-alpha.
|
||||
- Prevent a class of security bugs caused by treating the contents
|
||||
of a buffer chunk as if they were a NUL-terminated string. At
|
||||
least one such bug seems to be present in all currently used
|
||||
versions of Tor, and would allow an attacker to remotely crash
|
||||
most Tor instances, especially those compiled with extra compiler
|
||||
hardening. With this defense in place, such bugs can't crash Tor,
|
||||
though we should still fix them as they occur. Closes ticket
|
||||
20384 (TROVE-2016-10-001).
|
||||
|
||||
o Major bugfixes (security, pointers, backport from 0.2.8.2-alpha):
|
||||
- Avoid a difficult-to-trigger heap corruption attack when extending
|
||||
a smartlist to contain over 16GB of pointers. Fixes bug 18162;
|
||||
bugfix on 0.1.1.11-alpha, which fixed a related bug incompletely.
|
||||
Reported by Guido Vranken.
|
||||
|
||||
o Major bugfixes (dns proxy mode, crash, backport from 0.2.8.2-alpha):
|
||||
- Avoid crashing when running as a DNS proxy. Fixes bug 16248;
|
||||
bugfix on 0.2.0.1-alpha. Patch from "cypherpunks".
|
||||
|
||||
o Major bugfixes (key management, backport from 0.2.8.3-alpha):
|
||||
- If OpenSSL fails to generate an RSA key, do not retain a dangling
|
||||
pointer to the previous (uninitialized) key value. The impact here
|
||||
should be limited to a difficult-to-trigger crash, if OpenSSL is
|
||||
running an engine that makes key generation failures possible, or
|
||||
if OpenSSL runs out of memory. Fixes bug 19152; bugfix on
|
||||
0.2.1.10-alpha. Found by Yuan Jochen Kang, Suman Jana, and
|
||||
Baishakhi Ray.
|
||||
|
||||
o Major bugfixes (parsing, backported from 0.3.0.4-rc):
|
||||
- Fix an integer underflow bug when comparing malformed Tor
|
||||
versions. This bug could crash Tor when built with
|
||||
--enable-expensive-hardening, or on Tor 0.2.9.1-alpha through Tor
|
||||
0.2.9.8, which were built with -ftrapv by default. In other cases
|
||||
it was harmless. Part of TROVE-2017-001. Fixes bug 21278; bugfix
|
||||
on 0.0.8pre1. Found by OSS-Fuzz.
|
||||
|
||||
o Minor features (security, memory erasure, backport from 0.2.8.1-alpha):
|
||||
- Make memwipe() do nothing when passed a NULL pointer or buffer of
|
||||
zero size. Check size argument to memwipe() for underflow. Fixes
|
||||
bug 18089; bugfix on 0.2.3.25 and 0.2.4.6-alpha. Reported by "gk",
|
||||
patch by "teor".
|
||||
|
||||
o Minor features (bug-resistance, backport from 0.2.8.2-alpha):
|
||||
- Make Tor survive errors involving connections without a
|
||||
corresponding event object. Previously we'd fail with an
|
||||
assertion; now we produce a log message. Related to bug 16248.
|
||||
|
||||
o Minor features (geoip):
|
||||
- Update geoip and geoip6 to the February 8 2017 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
||||
|
||||
Changes in version 0.2.7.6 - 2015-12-10
|
||||
Tor version 0.2.7.6 fixes a major bug in entry guard selection, as
|
||||
well as a minor bug in hidden service reliability.
|
||||
|
|
111
ReleaseNotes
111
ReleaseNotes
|
@ -2,6 +2,117 @@ This document summarizes new features and bugfixes in each stable release
|
|||
of Tor. If you want to see more detailed descriptions of the changes in
|
||||
each development snapshot, see the ChangeLog file.
|
||||
|
||||
Changes in version 0.2.7.8 - 2017-06-08
|
||||
Tor 0.2.7.8 backports a fix for a bug that would allow an attacker to
|
||||
remotely crash a hidden service with an assertion failure. Anyone
|
||||
running a hidden service should upgrade to this version, or to some
|
||||
other version with fixes for TROVE-2017-005. (Versions before 0.3.0
|
||||
are not affected by TROVE-2017-004.)
|
||||
|
||||
o Major bugfixes (hidden service, relay, security):
|
||||
- Fix a remotely triggerable assertion failure caused by receiving a
|
||||
BEGIN_DIR cell on a hidden service rendezvous circuit. Fixes bug
|
||||
22494, tracked as TROVE-2017-005 and CVE-2017-0376; bugfix
|
||||
on 0.2.2.1-alpha.
|
||||
|
||||
o Minor features (geoip):
|
||||
- Update geoip and geoip6 to the May 2 2017 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
||||
o Minor bugfixes (correctness):
|
||||
- Avoid undefined behavior when parsing IPv6 entries from the geoip6
|
||||
file. Fixes bug 22490; bugfix on 0.2.4.6-alpha.
|
||||
|
||||
|
||||
Changes in version 0.2.7.7 - 2017-03-03
|
||||
Tor 0.2.7.7 backports a number of security fixes from later Tor
|
||||
releases. Anybody running Tor 0.2.7.6 or earlier should upgrade to
|
||||
this release, if for some reason they cannot upgrade to a later
|
||||
release series.
|
||||
|
||||
Note that support for Tor 0.2.7.x is ending this year: we will not issue
|
||||
any fixes for the Tor 0.2.7.x series after 1 August 2017. If you need
|
||||
a Tor release series with longer-term support, we recommend Tor 0.2.9.x.
|
||||
|
||||
o Directory authority changes (backport from 0.2.8.5-rc):
|
||||
- Urras is no longer a directory authority. Closes ticket 19271.
|
||||
|
||||
o Directory authority changes (backport from 0.2.9.2-alpha):
|
||||
- The "Tonga" bridge authority has been retired; the new bridge
|
||||
authority is "Bifroest". Closes tickets 19728 and 19690.
|
||||
|
||||
o Directory authority key updates (backport from 0.2.8.1-alpha):
|
||||
- Update the V3 identity key for the dannenberg directory authority:
|
||||
it was changed on 18 November 2015. Closes task 17906. Patch
|
||||
by "teor".
|
||||
|
||||
o Major bugfixes (parsing, security, backport from 0.2.9.8):
|
||||
- Fix a bug in parsing that could cause clients to read a single
|
||||
byte past the end of an allocated region. This bug could be used
|
||||
to cause hardened clients (built with --enable-expensive-hardening)
|
||||
to crash if they tried to visit a hostile hidden service. Non-
|
||||
hardened clients are only affected depending on the details of
|
||||
their platform's memory allocator. Fixes bug 21018; bugfix on
|
||||
0.2.0.8-alpha. Found by using libFuzzer. Also tracked as TROVE-
|
||||
2016-12-002 and as CVE-2016-1254.
|
||||
|
||||
o Major bugfixes (security, client, DNS proxy, backport from 0.2.8.3-alpha):
|
||||
- Stop a crash that could occur when a client running with DNSPort
|
||||
received a query with multiple address types, and the first
|
||||
address type was not supported. Found and fixed by Scott Dial.
|
||||
Fixes bug 18710; bugfix on 0.2.5.4-alpha.
|
||||
- Prevent a class of security bugs caused by treating the contents
|
||||
of a buffer chunk as if they were a NUL-terminated string. At
|
||||
least one such bug seems to be present in all currently used
|
||||
versions of Tor, and would allow an attacker to remotely crash
|
||||
most Tor instances, especially those compiled with extra compiler
|
||||
hardening. With this defense in place, such bugs can't crash Tor,
|
||||
though we should still fix them as they occur. Closes ticket
|
||||
20384 (TROVE-2016-10-001).
|
||||
|
||||
o Major bugfixes (security, pointers, backport from 0.2.8.2-alpha):
|
||||
- Avoid a difficult-to-trigger heap corruption attack when extending
|
||||
a smartlist to contain over 16GB of pointers. Fixes bug 18162;
|
||||
bugfix on 0.1.1.11-alpha, which fixed a related bug incompletely.
|
||||
Reported by Guido Vranken.
|
||||
|
||||
o Major bugfixes (dns proxy mode, crash, backport from 0.2.8.2-alpha):
|
||||
- Avoid crashing when running as a DNS proxy. Fixes bug 16248;
|
||||
bugfix on 0.2.0.1-alpha. Patch from "cypherpunks".
|
||||
|
||||
o Major bugfixes (key management, backport from 0.2.8.3-alpha):
|
||||
- If OpenSSL fails to generate an RSA key, do not retain a dangling
|
||||
pointer to the previous (uninitialized) key value. The impact here
|
||||
should be limited to a difficult-to-trigger crash, if OpenSSL is
|
||||
running an engine that makes key generation failures possible, or
|
||||
if OpenSSL runs out of memory. Fixes bug 19152; bugfix on
|
||||
0.2.1.10-alpha. Found by Yuan Jochen Kang, Suman Jana, and
|
||||
Baishakhi Ray.
|
||||
|
||||
o Major bugfixes (parsing, backported from 0.3.0.4-rc):
|
||||
- Fix an integer underflow bug when comparing malformed Tor
|
||||
versions. This bug could crash Tor when built with
|
||||
--enable-expensive-hardening, or on Tor 0.2.9.1-alpha through Tor
|
||||
0.2.9.8, which were built with -ftrapv by default. In other cases
|
||||
it was harmless. Part of TROVE-2017-001. Fixes bug 21278; bugfix
|
||||
on 0.0.8pre1. Found by OSS-Fuzz.
|
||||
|
||||
o Minor features (security, memory erasure, backport from 0.2.8.1-alpha):
|
||||
- Make memwipe() do nothing when passed a NULL pointer or buffer of
|
||||
zero size. Check size argument to memwipe() for underflow. Fixes
|
||||
bug 18089; bugfix on 0.2.3.25 and 0.2.4.6-alpha. Reported by "gk",
|
||||
patch by "teor".
|
||||
|
||||
o Minor features (bug-resistance, backport from 0.2.8.2-alpha):
|
||||
- Make Tor survive errors involving connections without a
|
||||
corresponding event object. Previously we'd fail with an
|
||||
assertion; now we produce a log message. Related to bug 16248.
|
||||
|
||||
o Minor features (geoip):
|
||||
- Update geoip and geoip6 to the February 8 2017 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
||||
|
||||
Changes in version 0.2.7.6 - 2015-12-10
|
||||
Tor version 0.2.7.6 fixes a major bug in entry guard selection, as
|
||||
well as a minor bug in hidden service reliability.
|
||||
|
|
|
@ -1,2 +0,0 @@
|
|||
o Directory authority changes:
|
||||
- Urras is no longer a directory authority. Closes ticket 19271.
|
|
@ -1,3 +0,0 @@
|
|||
o Directory authority changes (also in 0.2.8.7):
|
||||
- The "Tonga" bridge authority has been retired; the new bridge
|
||||
authority is "Bifroest". Closes tickets 19728 and 19690.
|
|
@ -1,11 +0,0 @@
|
|||
o Major features (security fixes):
|
||||
|
||||
- Prevent a class of security bugs caused by treating the contents
|
||||
of a buffer chunk as if they were a NUL-terminated string. At
|
||||
least one such bug seems to be present in all currently used
|
||||
versions of Tor, and would allow an attacker to remotely crash
|
||||
most Tor instances, especially those compiled with extra compiler
|
||||
hardening. With this defense in place, such bugs can't crash Tor,
|
||||
though we should still fix them as they occur. Closes ticket 20384
|
||||
(TROVE-2016-10-001).
|
||||
|
|
@ -1,8 +0,0 @@
|
|||
o Major bugfixes (dns proxy mode, crash):
|
||||
- Avoid crashing when running as a DNS proxy. Closes bug 16248; bugfix on
|
||||
0.2.0.1-alpha. Patch from 'cypherpunks'.
|
||||
|
||||
o Minor features (bug-resistance):
|
||||
- Make Tor survive errors involving connections without a corresponding
|
||||
event object. Previously we'd fail with an assertion; now we produce a
|
||||
log message. Related to bug 16248.
|
|
@ -1,4 +0,0 @@
|
|||
o Minor bugfixes (sandbox):
|
||||
- Add the "hidserv-stats" filename to our sandbox filter for the
|
||||
HiddenServiceStatistics option to work properly. Fixes bug 17354;
|
||||
bugfix on tor-0.2.6.2-alpha~54^2~1. Patch from David Goulet.
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features (authorities):
|
||||
- Update the V3 identity key for dannenberg, it was changed on
|
||||
18 November 2015.
|
||||
Closes task #17906. Patch by "teor".
|
|
@ -1,6 +0,0 @@
|
|||
o Minor fixes (security):
|
||||
- Make memwipe() do nothing when passed a NULL pointer
|
||||
or zero size. Check size argument to memwipe() for underflow.
|
||||
Closes bug #18089. Reported by "gk", patch by "teor".
|
||||
Bugfix on 0.2.3.25 and 0.2.4.6-alpha (#7352),
|
||||
commit 49dd5ef3 on 7 Nov 2012.
|
|
@ -1,7 +0,0 @@
|
|||
o Major bugfixes (security, pointers):
|
||||
|
||||
- Avoid a difficult-to-trigger heap corruption attack when extending
|
||||
a smartlist to contain over 16GB of pointers. Fixes bug #18162;
|
||||
bugfix on Tor 0.1.1.11-alpha, which fixed a related bug
|
||||
incompletely. Reported by Guido Vranken.
|
||||
|
|
@ -1,6 +0,0 @@
|
|||
o Major bugfixes (DNS proxy):
|
||||
- Stop a crash that could occur when a client running with DNSPort
|
||||
received a query with multiple address types, where the first
|
||||
address type was not supported. Found and fixed by Scott Dial.
|
||||
Fixes bug 18710; bugfix on 0.2.5.4-alpha.
|
||||
|
|
@ -1,10 +0,0 @@
|
|||
o Major features (security fixes):
|
||||
- Prevent a class of security bugs caused by treating the contents
|
||||
of a buffer chunk as if they were a NUL-terminated string. At
|
||||
least one such bug seems to be present in all currently used
|
||||
versions of Tor, and would allow an attacker to remotely crash
|
||||
most Tor instances, especially those compiled with extra compiler
|
||||
hardening. With this defense in place, such bugs can't crash Tor,
|
||||
though we should still fix them as they occur. Closes ticket
|
||||
20384 (TROVE-2016-10-001).
|
||||
|
|
@ -1,11 +0,0 @@
|
|||
o Major bugfixes (parsing, security):
|
||||
|
||||
- Fix a bug in parsing that could cause clients to read a single
|
||||
byte past the end of an allocated region. This bug could be
|
||||
used to cause hardened clients (built with
|
||||
--enable-expensive-hardening) to crash if they tried to visit
|
||||
a hostile hidden service. Non-hardened clients are only
|
||||
affected depending on the details of their platform's memory
|
||||
allocator. Fixes bug 21018; bugfix on 0.2.0.8-alpha. Found by
|
||||
using libFuzzer. Also tracked as TROVE-2016-12-002 and as
|
||||
CVE-2016-1254.
|
|
@ -1,3 +0,0 @@
|
|||
o Minor bugfixes (correctness):
|
||||
- Avoid undefined behavior when parsing IPv6 entries from the geoip6
|
||||
file. Fixes bug 22490; bugfix on 0.2.4.6-alpha.
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the April 5 2016 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the April 4 2017 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the August 2 2016 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the December 7 2016 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the February 2 2016 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the February 8 2017 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the January 5 2016 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the January 4 2017 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the July 6 2016 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the June 7 2016 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the March 3 2016 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the March 7 2017 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the May 4 2016 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the May 2 2017 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the November 3 2016 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the October 4 2016 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
o Minor features:
|
||||
- Update geoip and geoip6 to the September 6 2016 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
|
@ -1,7 +0,0 @@
|
|||
o Major bugfixes (key management):
|
||||
- If OpenSSL fails to generate an RSA key, do not retain a dangling pointer
|
||||
to the previous (uninitialized) key value. The impact here should be
|
||||
limited to a difficult-to-trigger crash, if OpenSSL is running an
|
||||
engine that makes key generation failures possible, or if OpenSSL runs
|
||||
out of memory. Fixes bug 19152; bugfix on 0.2.1.10-alpha. Found by
|
||||
Yuan Jochen Kang, Suman Jana, and Baishakhi Ray.
|
|
@ -1,8 +0,0 @@
|
|||
o Major bugfixes (parsing):
|
||||
- Fix an integer underflow bug when comparing malformed Tor versions.
|
||||
This bug is harmless, except when Tor has been built with
|
||||
--enable-expensive-hardening, which would turn it into a crash;
|
||||
or on Tor 0.2.9.1-alpha through Tor 0.2.9.8, which were built with
|
||||
-ftrapv by default.
|
||||
Part of TROVE-2017-001. Fixes bug 21278; bugfix on
|
||||
0.0.8pre1. Found by OSS-Fuzz.
|
|
@ -1,7 +0,0 @@
|
|||
o Major bugfixes (hidden service, relay, security):
|
||||
- Fix an assertion failure caused by receiving a BEGIN_DIR cell on
|
||||
a hidden service rendezvous circuit. Fixes bug 22494, tracked as
|
||||
TROVE-2017-005 and CVE-2017-0376; bugfix on 0.2.2.1-alpha. Found
|
||||
by armadev.
|
||||
|
||||
|
Loading…
Reference in New Issue