summaryrefslogtreecommitdiff
path: root/ChangeLog
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2016-10-17 16:31:40 -0400
committerNick Mathewson <nickm@torproject.org>2016-10-17 16:31:40 -0400
commit702c1dcf7b4b659a94c8cc5f1d81d34fc1aeae3f (patch)
tree1150afe1a8b90415cd591c3505238241f8f16fa9 /ChangeLog
parent8b0755c9bb296ae210e83b88e099d52e40b6f2aa (diff)
downloadtor-702c1dcf7b4b659a94c8cc5f1d81d34fc1aeae3f.tar.gz
tor-702c1dcf7b4b659a94c8cc5f1d81d34fc1aeae3f.zip
Bump master to 0.2.9.4-alpha-dev
Diffstat (limited to 'ChangeLog')
-rw-r--r--ChangeLog25
1 files changed, 25 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog
index aa9aace759..7a10a7ce96 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,28 @@
+Changes in version 0.2.9.5-rc - 2016-1?-??
+
+
+Changes in version 0.2.8.9 - 2016-10-17
+ Tor 0.2.8.9 backports a fix for a security hole in previous versions
+ of Tor that would allow a remote attacker to crash a Tor client,
+ hidden service, relay, or authority. All Tor users should upgrade to
+ this version, or to 0.2.9.4-alpha. Patches will be released for older
+ versions of Tor.
+
+ o Major features (security fixes, also in 0.2.9.4-alpha):
+ - Prevent a class of security bugs caused by treating the contents
+ of a buffer chunk as if they were a NUL-terminated string. At
+ least one such bug seems to be present in all currently used
+ versions of Tor, and would allow an attacker to remotely crash
+ most Tor instances, especially those compiled with extra compiler
+ hardening. With this defense in place, such bugs can't crash Tor,
+ though we should still fix them as they occur. Closes ticket
+ 20384 (TROVE-2016-10-001).
+
+ o Minor features (geoip):
+ - Update geoip and geoip6 to the October 4 2016 Maxmind GeoLite2
+ Country database.
+
+
Changes in version 0.2.9.4-alpha - 2016-10-17
Tor 0.2.9.4-alpha fixes a security hole in previous versions of Tor
that would allow a remote attacker to crash a Tor client, hidden