summaryrefslogtreecommitdiff
path: root/changes
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2016-07-17 13:55:04 -0400
committerNick Mathewson <nickm@torproject.org>2016-07-17 13:55:04 -0400
commitc138c9a2be868c4d8bad4e6ae5637205f1bdcf0f (patch)
tree43baab11abc049adf6c1d266a444fdd10c4936ee /changes
parent9932544297e02dc4f79d70317f214bcbb2dd8e9a (diff)
parentfbae15a856fccdecfb19ff80229b584026ae2def (diff)
downloadtor-c138c9a2be868c4d8bad4e6ae5637205f1bdcf0f.tar.gz
tor-c138c9a2be868c4d8bad4e6ae5637205f1bdcf0f.zip
Merge branch 'maint-0.2.8'
Diffstat (limited to 'changes')
-rw-r--r--changes/bug196608
-rw-r--r--changes/bug196823
2 files changed, 11 insertions, 0 deletions
diff --git a/changes/bug19660 b/changes/bug19660
new file mode 100644
index 0000000000..72d32c8fe2
--- /dev/null
+++ b/changes/bug19660
@@ -0,0 +1,8 @@
+ o Minor bugfixes (sandboxing):
+ - If we did not find a non-private IPaddress by iterating over
+ interfaces, we would try to get one via
+ get_interface_address6_via_udp_socket_hack(). This opens a
+ datagram socket with IPPROTO_UDP. Previously all our datagram
+ sockets (via libevent) used IPPROTO_IP, so we did not have that
+ in the sandboxing whitelist. Add (SOCK_DGRAM, IPPROTO_UDP)
+ sockets to the sandboxing whitelist. Fixes bug 19660.
diff --git a/changes/bug19682 b/changes/bug19682
new file mode 100644
index 0000000000..c799c417ac
--- /dev/null
+++ b/changes/bug19682
@@ -0,0 +1,3 @@
+ o Minor bugfixes (compilation):
+ - Fix compilation warning in the unit tests on systems where
+ char is signed. Fixes bug 19682; bugfix on 0.2.8.1-alpha.