7 Commits

Author SHA256 Message Date
f94634f0c6 Accepting request 1325335 from network
- update to 0.4.8.21:
  * This release is a continuation of the previous one and
    addresses additional Conflux-related issues identified through
    further testing and feedback from relay operators. We strongly
    recommend upgrading as soon as possible.
  * Major bugfixes (conflux, exit):
    - When dequeuing out-of-order conflux cells, the circuit
    could be close in between two dequeue which could lead to a
    mishandling of a NULL pointer. Fixes bug 41162;
  * Add -mbranch-protection=standard for arm64.
  * Regenerate fallback directories generated on November
  * Update the geoip files to match the IPFire Location
    Database, as retrieved on 2025/11/17.
  * Fix a bug causing the initial tor process to hang
    intead of exiting with RunAsDaemon, when pluggable transports
    are used.

    valid when it is successfully processed. This will quiet a
  * CVE-2021-22929: do not log v2 onion services access attempt
- tor 0.3.0.7:
  quite a bit
- Remove useless conditon for libevent, there is dependency for it
  Clients using circuit isolation should upgrade;
    load.
    cell.
- tor 0.2.4.22:
  fixes potentially poor random number generation for users who
  1) use OpenSSL 1.0.0 or later,
  2) set "HardwareAccel 1" in their torrc file,
  and (forwarded request 1325233 from dirkmueller)

OBS-URL: https://build.opensuse.org/request/show/1325335
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tor?expand=0&rev=131
2026-01-05 13:54:47 +00:00
578f48fd52 - update to 0.4.8.21:
* This release is a continuation of the previous one and
    addresses additional Conflux-related issues identified through
    further testing and feedback from relay operators. We strongly
    recommend upgrading as soon as possible.
  * Major bugfixes (conflux, exit):
    - When dequeuing out-of-order conflux cells, the circuit
    could be close in between two dequeue which could lead to a
    mishandling of a NULL pointer. Fixes bug 41162;
  * Add -mbranch-protection=standard for arm64.
  * Regenerate fallback directories generated on November
  * Update the geoip files to match the IPFire Location
    Database, as retrieved on 2025/11/17.
  * Fix a bug causing the initial tor process to hang
    intead of exiting with RunAsDaemon, when pluggable transports
    are used.

    valid when it is successfully processed. This will quiet a
  * CVE-2021-22929: do not log v2 onion services access attempt
- tor 0.3.0.7:
  quite a bit
- Remove useless conditon for libevent, there is dependency for it
  Clients using circuit isolation should upgrade;
    load.
    cell.
- tor 0.2.4.22:
  fixes potentially poor random number generation for users who
  1) use OpenSSL 1.0.0 or later,
  2) set "HardwareAccel 1" in their torrc file,
  and

OBS-URL: https://build.opensuse.org/package/show/network/tor?expand=0&rev=293
2026-01-05 06:37:12 +00:00
85a4d5ac53 Accepting request 1318544 from network
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/1318544
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tor?expand=0&rev=130
2025-11-19 14:00:51 +00:00
9b30065670 0.4.8.20
* Add a new hardening compiler flag -fcf-protection=full
  * Fix the root cause of some conflux fragile asserts
  * Fix a series of conflux edge cases

OBS-URL: https://build.opensuse.org/package/show/network/tor?expand=0&rev=291
2025-11-12 03:42:41 +00:00
5b2601127d Accepting request 1310926 from network
0.4.8.19
  * Fix some clients not being able to connect to LibreSSL relays
  * Improve stream flow control performance

OBS-URL: https://build.opensuse.org/request/show/1310926
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tor?expand=0&rev=129
2025-10-12 20:24:33 +00:00
9614214a83 drop old files properly
OBS-URL: https://build.opensuse.org/package/show/network/tor?expand=0&rev=289
2025-10-08 07:44:32 +00:00
ca5bbf51cb 0.4.8.19
* Fix some clients not being able to connect to LibreSSL relays
  * Improve stream flow control performance

OBS-URL: https://build.opensuse.org/package/show/network/tor?expand=0&rev=288
2025-10-08 07:44:14 +00:00
8 changed files with 89 additions and 54 deletions

View File

@@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:4aea6c109d4eff4ea2bafb905a7e6b0a965d14fe856214b02fcd9046b4d93af8
size 10139317

View File

@@ -1 +0,0 @@
4aea6c109d4eff4ea2bafb905a7e6b0a965d14fe856214b02fcd9046b4d93af8 tor-0.4.8.18.tar.gz

View File

@@ -1,18 +0,0 @@
-----BEGIN PGP SIGNATURE-----
iQEzBAABCAAdFiEEt0QX7d8irJ+ekPSRQuhqKhH0jTYFAmjJhoIACgkQQuhqKhH0
jTbmFwf/bm1hykDFLO7QgqL8nMd1Zri0LlTzWUhdFzi8XY6QFb/X0qth+nI3IZnx
A6zQkqGgOyJPK871QJDvSttQSbNqqEL4Ks3R5ImTtrlkLJitAbYuenVuXs5Ul+x6
SlfBEAYfe/1OgDnZSe13bAiL+1hJNMxyh8vpu4fcLbQxTZk+dCobjC7V6TlzBvsJ
dMLEQs+Fa+nZx5aol8Asahx7CcPSZdhyTIrxaW7fzQWrOSv4Dnc3EF+XwXDPN2+L
s23/W/gFod2eacyZQbDaxrQT8r0Q9FraNlrl/DDIk9V5ZP8B1bi1sO40oVIVz0fv
jcck9GPY05lM8qJ9kThHaDn7bfjgiw==
=tx5R
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQRRQQJFTQqH2wdnoeu+agUxwYqReQUCaMmHfgAKCRC+agUxwYqR
eZgcAP9bh1iYOvgWRfl4MT1rWM2IwEm6eAj2I1/ONK0onQhNjgEA0F45K7P8Q98q
Omptk4nxTslHZ75z01TVdFv7rvVdLgo=
=41Rz
-----END PGP SIGNATURE-----

3
tor-0.4.8.21.tar.gz Normal file
View File

@@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:eaf6f5b73091b95576945eade98816ddff7cd005befe4d94718a6f766b840903
size 10663112

View File

@@ -0,0 +1 @@
eaf6f5b73091b95576945eade98816ddff7cd005befe4d94718a6f766b840903 tor-0.4.8.21.tar.gz

View File

@@ -0,0 +1,18 @@
-----BEGIN PGP SIGNATURE-----
iQEzBAABCAAdFiEEt0QX7d8irJ+ekPSRQuhqKhH0jTYFAmkbZc0ACgkQQuhqKhH0
jTbzrQf/cpBaty1D2rSfpwqrvZgTjqrdWbse0UdGrwjXnYJ2GB85dmtZvQ3OR73/
twkzFpSQZCfb+ac3XMVPRUfkyDGLmDvJFNYbK00BYSedoMZt1J/BXdhIzu+KQsuB
9W18BImx69onmNwCBj6/5hjVg5Gl6X1m6Hwsh+jjuqyA9dhLhASaOTfy2L8IB1Ea
byAlg2mcWCL1sjbIQ2gzzZZycb0LRzpsjTlrn5ZTIjVQFfgQL69BrdUovQiBDs0q
I38lToKlm0SwltVEz4urfQQjQ9oBJrP4C/aiNTkoqeS2vJkfxW9LIdyhE7IA+Rjd
CfuO3+VZM43bhUwHNOH2heLdaJeSvA==
=EO+p
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQRRQQJFTQqH2wdnoeu+agUxwYqReQUCaRtm1AAKCRC+agUxwYqR
eXZvAQDeceMJ1+RlMh7sG4ohbej2xfO0lRPQhudNsnlzkrDSWAEA9S1NNZ7DN263
K3zGTYE80X2ZoztnMIGg1oCz0cIh/AM=
=5oGC
-----END PGP SIGNATURE-----

View File

@@ -1,3 +1,38 @@
-------------------------------------------------------------------
Sat Jan 3 21:31:00 UTC 2026 - Dirk Müller <dmueller@suse.com>
- update to 0.4.8.21:
* This release is a continuation of the previous one and
addresses additional Conflux-related issues identified through
further testing and feedback from relay operators. We strongly
recommend upgrading as soon as possible.
* Major bugfixes (conflux, exit):
- When dequeuing out-of-order conflux cells, the circuit
could be close in between two dequeue which could lead to a
mishandling of a NULL pointer. Fixes bug 41162;
* Add -mbranch-protection=standard for arm64.
* Regenerate fallback directories generated on November
* Update the geoip files to match the IPFire Location
Database, as retrieved on 2025/11/17.
* Fix a bug causing the initial tor process to hang
intead of exiting with RunAsDaemon, when pluggable transports
are used.
-------------------------------------------------------------------
Wed Nov 12 03:28:25 UTC 2025 - Bernhard Wiedemann <bwiedemann@suse.de>
- 0.4.8.20
* Add a new hardening compiler flag -fcf-protection=full
* Fix the root cause of some conflux fragile asserts
* Fix a series of conflux edge cases
-------------------------------------------------------------------
Wed Oct 8 07:42:37 UTC 2025 - Bernhard Wiedemann <bwiedemann@suse.de>
- 0.4.8.19
* Fix some clients not being able to connect to LibreSSL relays
* Improve stream flow control performance
-------------------------------------------------------------------
Wed Sep 17 06:19:42 UTC 2025 - Bernhard Wiedemann <bwiedemann@suse.de>
@@ -93,7 +128,7 @@ Fri Nov 3 20:51:01 UTC 2023 - Andreas Stieger <andreas.stieger@gmx.de>
* directory authority: Look at the network parameter
"maxunmeasuredbw" with the correct spelling
* vanguards addon support: Count the conflux linked cell as
valid when it is successfully processed. This will quiet a
valid when it is successfully processed. This will quiet a
spurious warn in the vanguards addon
-------------------------------------------------------------------
@@ -146,7 +181,7 @@ Sun Jul 30 07:33:04 UTC 2023 - Andreas Stieger <andreas.stieger@gmx.de>
- tor 0.4.7.14:
* bugfix affecting vanguards (onion service), and minor fixes
-------------------------------------------------------------------
Fri Mar 10 08:27:57 UTC 2023 - Martin Pluskal <mpluskal@suse.com>
@@ -188,14 +223,14 @@ Thu Nov 10 19:14:54 UTC 2022 - Andreas Stieger <andreas.stieger@gmx.de>
client rendezvous circuit to avoid timeouts and retry load
* Make the service retry a rendezvous if the circuit is being
repurposed for measurements
-------------------------------------------------------------------
Fri Aug 12 15:52:53 UTC 2022 - Andreas Stieger <andreas.stieger@gmx.de>
- tor 0.4.7.10
* IPFire location database did not have proper ARIN network
allocations - affected circuit path selection and relay metrics
-------------------------------------------------------------------
Thu Aug 11 16:39:24 UTC 2022 - Andreas Stieger <andreas.stieger@gmx.de>
@@ -261,7 +296,7 @@ Sat Nov 13 11:02:55 UTC 2021 - Andreas Stieger <andreas.stieger@gmx.de>
errors by relays
* Regenerate fallback directories for October 2021
* Bug fixes for onion services
* CVE-2021-22929: do not log v2 onion services access attempt
* CVE-2021-22929: do not log v2 onion services access attempt
warnings on disk excessively (TROVE-2021-008, boo#1192658)
-------------------------------------------------------------------
@@ -620,7 +655,7 @@ Sat Jul 14 18:31:57 UTC 2018 - astieger@suse.com
* move to a new bridge authority
* backport some bug fixes
- refresh upstream signing keyring
-------------------------------------------------------------------
Mon Jul 9 19:38:14 UTC 2018 - astieger@suse.com
@@ -768,7 +803,7 @@ Wed May 31 10:01:51 UTC 2017 - astieger@suse.com
-------------------------------------------------------------------
Tue May 16 00:26:43 UTC 2017 - astieger@suse.com
- tor 0.3.0.7:
- tor 0.3.0.7:
* Fix an assertion failure in the hidden service directory code,
which could be used by an attacker to remotely cause a Tor
relay process to exit. TROVE-2017-002 bsc#1039211
@@ -836,7 +871,7 @@ Sun Jan 1 11:43:02 UTC 2017 - tchvatal@suse.com
- Remove conditionals for the sle11 as we won't build there due to
openssl requirements. This reduces the logic in the spec file
quite a bit
quite a bit
-------------------------------------------------------------------
Mon Dec 19 20:40:39 UTC 2016 - astieger@suse.com
@@ -949,7 +984,7 @@ Mon Mar 21 08:17:17 UTC 2016 - astieger@suse.com
Fri Dec 11 14:41:37 UTC 2015 - mpluskal@suse.com
- Make building more verbose
- Remove useless conditon for libevent, there is dependency for it
- Remove useless conditon for libevent, there is dependency for it
anyway
-------------------------------------------------------------------
@@ -1007,7 +1042,7 @@ Sun Jul 12 20:54:48 UTC 2015 - astieger@suse.com
Thu Jun 11 18:55:44 UTC 2015 - astieger@suse.com
- tor 0.2.6.9:
Clients using circuit isolation should upgrade;
Clients using circuit isolation should upgrade;
all directory authorities should upgrade.
* fixes a regression in the circuit isolation code
* increases the requirements for receiving an HSDir flag
@@ -1052,7 +1087,7 @@ Mon Apr 6 18:56:30 UTC 2015 - astieger@suse.com
- Decrease the amount of reattempts that a hidden service
performs when its rendezvous circuits fail. This reduces the
computational cost for running a hidden service under heavy
load.
load.
-------------------------------------------------------------------
Sun Mar 29 11:51:09 UTC 2015 - astieger@suse.com
@@ -1178,7 +1213,7 @@ Wed Jul 30 22:52:17 UTC 2014 - andreas.stieger@gmx.de
a small class of private ntor keys.
- Minor bugfixes:
- Warn and drop the circuit if we receive an inbound 'relay early'
cell.
cell.
- Correct a confusing error message when trying to extend a circuit
via the control protocol but we don't know a descriptor or
microdescriptor for one of the specified relays.
@@ -1194,7 +1229,7 @@ Fri Jun 6 18:51:36 UTC 2014 - andreas.stieger@gmx.de
-------------------------------------------------------------------
Sat May 17 23:13:54 UTC 2014 - andreas.stieger@gmx.de
- tor 0.2.4.22:
- tor 0.2.4.22:
Backports numerous high-priority fixes. These include blocking
all authority signing keys that may have been affected by the
OpenSSL "heartbleed" bug, choosing a far more secure set of TLS
@@ -1254,13 +1289,13 @@ Mon Jan 20 19:46:02 UTC 2014 - andreas.stieger@gmx.de
Fri Dec 27 20:55:26 UTC 2013 - andreas.stieger@gmx.de
- tor 0.2.4.20
fixes potentially poor random number generation for users who
1) use OpenSSL 1.0.0 or later,
2) set "HardwareAccel 1" in their torrc file,
fixes potentially poor random number generation for users who
1) use OpenSSL 1.0.0 or later,
2) set "HardwareAccel 1" in their torrc file,
3) have "Sandy Bridge" or "Ivy Bridge" Intel processors
and
and
4) have no state file in their DataDirectory (as would happen on
first start).
first start).
Users who generated relay or hidden service identity keys in such
a situation should discard them and generate new ones.
No 2 is not the default configuration for openSUSE.
@@ -1307,7 +1342,7 @@ Sat Dec 14 17:43:22 UTC 2013 - andreas.stieger@gmx.de
transports, and a new "circuitmux" abstraction storing the queue of
circuits for a channel. The release also includes many stability,
security, and privacy fixes.
- full changelog relative to 0.2.3.x and 0.2.4.x RC series:
- full changelog relative to 0.2.3.x and 0.2.4.x RC series:
https://gitweb.torproject.org/tor.git?a=blob_plain;hb=release-0.2.4;f=ReleaseNotes
-------------------------------------------------------------------
@@ -1352,13 +1387,13 @@ Tue Nov 27 21:46:02 UTC 2012 - andreas.stieger@gmx.de
+ significantly reduced directory overhead (via microdescriptors)
+ enormous crypto performance improvements for fast relays on new
enough hardware
+ new v3 TLS handshake protocol that can better resist
+ new v3 TLS handshake protocol that can better resist
fingerprinting
+ support for protocol obfuscation plugins (pluggable transports)
+ better scalability for hidden services
+ IPv6 support for bridges
+ performance improvements
+ new "stream isolation" design to isolate different applications
+ performance improvements
+ new "stream isolation" design to isolate different applications
on different circuits
+ many stability, security, and privacy fixes
+ Complete list of changes enumerated in:
@@ -1367,7 +1402,7 @@ Tue Nov 27 21:46:02 UTC 2012 - andreas.stieger@gmx.de
+ Tear down the circuit when receiving an unexpected SENDME cell.
[bnc#791374] CVE-2012-5573
- build using --enable-bufferevents provided by Libevent 2.0.13
-------------------------------------------------------------------
Tue Nov 20 09:07:23 UTC 2012 - dimstar@opensuse.org
@@ -1379,7 +1414,7 @@ Sat Sep 15 14:08:49 UTC 2012 - andreas.stieger@gmx.de
- update to 0.2.2.39 [bnc#780620]
Changes in version 0.2.2.39 - 2012-09-11
Tor 0.2.2.39 fixes two more opportunities for remotely triggerable
Tor 0.2.2.39 fixes two more opportunities for remotely triggerable
assertions.
o Security fixes:
@@ -1399,7 +1434,7 @@ Mon Aug 20 19:11:57 UTC 2012 - andreas.stieger@gmx.de
Changes in version 0.2.2.38 - 2012-08-12
Tor 0.2.2.38 fixes a rare race condition that can crash exit relays;
fixes a remotely triggerable crash bug; and fixes a timing attack that
could in theory leak path information.
could in theory leak path information.
o Security fixes:
- Avoid read-from-freed-memory and double-free bugs that could occur
when a DNS request fails while launching it.
@@ -1603,7 +1638,7 @@ Mon Jan 2 16:51:20 UTC 2012 - andreas.stieger@gmx.de
-------------------------------------------------------------------
Fri Dec 16 20:37:05 UTC 2011 - andreas.stieger@gmx.de
- update to upstream 0.2.2.35, which fixes a critical heap-overflow
- update to upstream 0.2.2.35, which fixes a critical heap-overflow
security issue: CVE-2011-2778 For a full list of changes, see:
https://gitweb.torproject.org/tor.git/blob_plain/release-0.2.2:/ReleaseNotes
@@ -3179,22 +3214,22 @@ Fri Nov 26 17:12:40 UTC 2010 - andreas.stieger@gmx.de
Fri Aug 6 03:53:35 UTC 2010 - cristian.rodriguez@opensuse.org
- %ghost the pid file so /var/run can be mounted tmpfs
- require logrotate
- require logrotate
-------------------------------------------------------------------
Sat May 29 17:50:51 UTC 2010 - andreas.stieger@gmx.de
- updated to upstream 0.2.1.26
- updated to upstream 0.2.1.26
-------------------------------------------------------------------
Sun Mar 28 17:00:30 UTC 2010 - andreas.stieger@gmx.de
- updated to upstream 0.2.1.25
- updated to upstream 0.2.1.25
-------------------------------------------------------------------
Mon Mar 1 20:49:13 UTC 2010 - andreas.stieger@gmx.de
- new upstream version (0.2.1.24)
- new upstream version (0.2.1.24)
-------------------------------------------------------------------
Fri Jan 29 13:34:55 UTC 2010 - puzel@novell.com

View File

@@ -1,7 +1,7 @@
#
# spec file for package tor
#
# Copyright (c) 2024 SUSE LLC
# Copyright (c) 2026 SUSE LLC and contributors
# Copyright (c) 2025 Andreas Stieger <Andreas.Stieger@gmx.de>
#
# All modifications and additions to the file contributed by third parties
@@ -21,7 +21,7 @@
%define torgroup %{name}
%define home_dir %{_localstatedir}/lib/empty
Name: tor
Version: 0.4.8.18
Version: 0.4.8.21
Release: 0
Summary: Anonymizing overlay network for TCP (The onion router)
License: BSD-3-Clause