summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2020-03-17 15:37:50 -0400
committerNick Mathewson <nickm@torproject.org>2020-03-17 15:37:50 -0400
commitd82fb437e250e5e2bd29a07658579197d566654d (patch)
tree12c8133f5fab96739ecf7d6df002866c82d71de7
parent2e80d38dcd9996c8d7cb78808edf91a14904e271 (diff)
downloadtor-d82fb437e250e5e2bd29a07658579197d566654d.tar.gz
tor-d82fb437e250e5e2bd29a07658579197d566654d.zip
fold in changelog and blurb for trove-2020-002
-rw-r--r--ChangeLog26
1 files changed, 25 insertions, 1 deletions
diff --git a/ChangeLog b/ChangeLog
index 20a78b5d2f..e6c153be45 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,5 +1,29 @@
Changes in version 0.3.5.10 - 2020-03-??
- blurb.
+ Tor 0.3.5.10 backports many fixes from later Tor releases, including a
+ fix for TROVE-2020-002, a major denial-of-service vulnerability that
+ affected all released Tor instances since 0.2.1.5-alpha. Using this
+ vulnerability, an attacker could cause Tor instances to consume a huge
+ amount of CPU, disrupting their operations for several seconds or
+ minutes. This attack could be launched by anybody against a relay, or
+ by a directory cache against any client that had connected to it. The
+ attacker could launch this attack as much as they wanted, thereby
+ disrupting service or creating patterns that could aid in traffic
+ analysis. This issue was found by OSS-Fuzz, and is also tracked
+ as CVE-2020-10592.
+
+ We do not have reason to believe that this attack is currently being
+ exploited in the wild, but nonetheless we advise everyone to upgrade
+ as soon as packages are available.
+
+ o Major bugfixes (security, denial-of-service, backport from 0.4.3.3-alpha):
+ - Fix a denial-of-service bug that could be used by anyone to
+ consume a bunch of CPU on any Tor relay or authority, or by
+ directories to consume a bunch of CPU on clients or hidden
+ services. Because of the potential for CPU consumption to
+ introduce observable timing patterns, we are treating this as a
+ high-severity security issue. Fixes bug 33119; bugfix on
+ 0.2.1.5-alpha. Found by OSS-Fuzz. We are also tracking this issue
+ as TROVE-2020-002 and CVE-2020-10592.
o Major bugfixes (linux seccomp sandbox, backport from 0.4.3.1-alpha):
- Correct how we use libseccomp. Particularly, stop assuming that