diff options
author | Roger Dingledine <arma@torproject.org> | 2012-08-13 00:35:37 -0400 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2012-08-13 00:35:37 -0400 |
commit | 37d19fdfcd4bc82da3276c18b616e7c64ca0c6ab (patch) | |
tree | c29bc852ea30b959e029ba8af41adeb478254753 /ChangeLog | |
parent | ca90aea5ebde66565fbb6fb5d0e88a970d3563a5 (diff) | |
download | tor-37d19fdfcd4bc82da3276c18b616e7c64ca0c6ab.tar.gz tor-37d19fdfcd4bc82da3276c18b616e7c64ca0c6ab.zip |
forward-port the 0.2.2.38 changelog
Diffstat (limited to 'ChangeLog')
-rw-r--r-- | ChangeLog | 25 |
1 files changed, 25 insertions, 0 deletions
@@ -1,3 +1,28 @@ +Changes in version 0.2.2.38 - 2012-08-12 + Tor 0.2.2.38 fixes a rare race condition that can crash exit relays; + fixes a remotely triggerable crash bug; and fixes a timing attack that + could in theory leak path information. + + o Security fixes: + - Avoid read-from-freed-memory and double-free bugs that could occur + when a DNS request fails while launching it. Fixes bug 6480; + bugfix on 0.2.0.1-alpha. + - Avoid an uninitialized memory read when reading a vote or consensus + document that has an unrecognized flavor name. This read could + lead to a remote crash bug. Fixes bug 6530; bugfix on 0.2.2.6-alpha. + - Try to leak less information about what relays a client is + choosing to a side-channel attacker. Previously, a Tor client would + stop iterating through the list of available relays as soon as it + had chosen one, thus finishing a little earlier when it picked + a router earlier in the list. If an attacker can recover this + timing information (nontrivial but not proven to be impossible), + they could learn some coarse-grained information about which relays + a client was picking (middle nodes in particular are likelier to + be affected than exits). The timing attack might be mitigated by + other factors (see bug 6537 for some discussion), but it's best + not to take chances. Fixes bug 6537; bugfix on 0.0.8rc1. + + Changes in version 0.2.3.20-rc - 2012-08-05 Tor 0.2.3.20-rc is the third release candidate for the Tor 0.2.3.x series. It fixes a pair of code security bugs and a potential anonymity |