diff options
author | Nick Mathewson <nickm@torproject.org> | 2016-07-17 13:55:04 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2016-07-17 13:55:04 -0400 |
commit | c138c9a2be868c4d8bad4e6ae5637205f1bdcf0f (patch) | |
tree | 43baab11abc049adf6c1d266a444fdd10c4936ee /changes | |
parent | 9932544297e02dc4f79d70317f214bcbb2dd8e9a (diff) | |
parent | fbae15a856fccdecfb19ff80229b584026ae2def (diff) | |
download | tor-c138c9a2be868c4d8bad4e6ae5637205f1bdcf0f.tar.gz tor-c138c9a2be868c4d8bad4e6ae5637205f1bdcf0f.zip |
Merge branch 'maint-0.2.8'
Diffstat (limited to 'changes')
-rw-r--r-- | changes/bug19660 | 8 | ||||
-rw-r--r-- | changes/bug19682 | 3 |
2 files changed, 11 insertions, 0 deletions
diff --git a/changes/bug19660 b/changes/bug19660 new file mode 100644 index 0000000000..72d32c8fe2 --- /dev/null +++ b/changes/bug19660 @@ -0,0 +1,8 @@ + o Minor bugfixes (sandboxing): + - If we did not find a non-private IPaddress by iterating over + interfaces, we would try to get one via + get_interface_address6_via_udp_socket_hack(). This opens a + datagram socket with IPPROTO_UDP. Previously all our datagram + sockets (via libevent) used IPPROTO_IP, so we did not have that + in the sandboxing whitelist. Add (SOCK_DGRAM, IPPROTO_UDP) + sockets to the sandboxing whitelist. Fixes bug 19660. diff --git a/changes/bug19682 b/changes/bug19682 new file mode 100644 index 0000000000..c799c417ac --- /dev/null +++ b/changes/bug19682 @@ -0,0 +1,3 @@ + o Minor bugfixes (compilation): + - Fix compilation warning in the unit tests on systems where + char is signed. Fixes bug 19682; bugfix on 0.2.8.1-alpha. |