9b30065670
0.4.8.20 * Add a new hardening compiler flag -fcf-protection=full * Fix the root cause of some conflux fragile asserts * Fix a series of conflux edge cases
Bernhard Wiedemann2025-11-12 03:42:41 +00:00
ca5bbf51cb
0.4.8.19 * Fix some clients not being able to connect to LibreSSL relays * Improve stream flow control performance
Bernhard Wiedemann2025-10-08 07:44:14 +00:00
01a1f4be84
0.4.8.18 * important bug fix for onion service directory * use quantum-resistant MLKEM-768 cipher
Bernhard Wiedemann2025-09-17 06:22:36 +00:00
955ec2c405
Accepting request 1293867 from network
Ana Guerrero2025-07-17 15:18:47 +00:00
644013bb8b
Accepting request 1243500 from network
Ana Guerrero2025-02-05 20:57:03 +00:00
815f6f2e0d
tor 0.4.8.14 * bugfix for onion service directory cache * test-network now unconditionally includes IPv6 * Regenerate fallback directories 2025-02-05 * Update the geoip files to 2025-02-05 * Fix a pointer free
Bernhard Wiedemann2025-02-05 18:29:26 +00:00
4fd0c24b47
Accepting request 1234472 from network
Ana Guerrero2025-01-02 18:22:48 +00:00
cf08be7333
Accepting request 1146604 from home:pluskalm:branches:network
Marcus Meissner2024-03-01 12:33:21 +00:00
6f2baa2130
Accepting request 1144494 from network
Ana Guerrero2024-02-06 15:35:24 +00:00
763deefb3d
Accepting request 1144143 from home:AndreasStieger:branches:network
Marcus Meissner2024-02-06 08:31:51 +00:00
9320fdb7be
Accepting request 1132448 from network
Ana Guerrero2023-12-11 20:51:27 +00:00
b6afb73e5b
Accepting request 1132316 from home:AndreasStieger:branches:network
Dirk Mueller2023-12-11 09:17:58 +00:00
fc05c942fe
tor 0.4.8.10: * (TROVE-2023-007, exit) - fix a a UAF and NULL pointer dereference crash on Exit relays
Bernhard Wiedemann2023-12-08 21:52:40 +00:00
5fc9dd8f27
Accepting request 1124741 from network
Ana Guerrero2023-11-09 20:36:29 +00:00
42f862bfe3
tor 0.4.8.9: * (onion service, TROVE-2023-006): - Fix a possible hard assert on a NULL pointer * (guard usage): - When Tor excluded a guard due to temporary circuit restrictions, it considered *additional* primary guards for potential usage by that circuit.
Bernhard Wiedemann2023-11-09 17:40:19 +00:00
60369823bb
Accepting request 1123499 from network
Ana Guerrero2023-11-06 20:14:12 +00:00
d3bbb6478e
Accepting request 1123276 from home:AndreasStieger:branches:network
Bernhard Wiedemann2023-11-06 07:08:29 +00:00
475e55596a
Accepting request 1114259 from network
Ana Guerrero2023-10-02 18:05:01 +00:00
3451f8ea6c
Accepting request 1113538 from home:AndreasStieger:branches:network
Dirk Mueller2023-09-29 07:24:31 +00:00
2eec37d211
Accepting request 913992 from home:jengelh:branches:network
Lars Vogdt
2021-09-14 09:53:56 +00:00
70365a2b6a
Accepting request 912796 from network
Richard Brown
2021-08-19 08:00:59 +00:00
f9d04d4f5a
tor 0.4.6.7: * Fix a DoS via a remotely triggerable assertion failure (boo#1189489, TROVE-2021-007, CVE-2021-38385)
Bernhard Wiedemann2021-08-17 18:55:29 +00:00
82111f669e
* Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell (CVE-2021-34548, boo#1187322) * Detect more failure conditions from the OpenSSL RNG code (boo#1187323) * Resist a hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549, boo#1187324) * Fix an out-of-bounds memory access in v3 onion service descriptor parsing (CVE-2021-34550, boo#1187325)
Bernhard Wiedemann2021-06-15 04:50:11 +00:00
5806eeacc7
tor 0.4.5.9 * Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell * Detect more failure conditions from the OpenSSL RNG code * Resist a hashtable-based CPU denial-of-service attack against relays * Fix an out-of-bounds memory access in v3 onion service descriptor parsing
Bernhard Wiedemann2021-06-14 18:08:02 +00:00
d1e0189c3f
tor 0.4.5.7 * https://lists.torproject.org/pipermail/tor-announce/2021-March/000216.html * Fix 2 denial of service security issues + Disable the dump_desc() function that we used to dump unparseable information to disk (CVE-2021-28089) + Fix a bug in appending detached signatures to a pending consensus document that could be used to crash a directory authority (CVE-2021-28090) * Ship geoip files based on the IPFire Location Database
Bernhard Wiedemann2021-03-16 23:45:23 +00:00
b972deb443
tor 0.4.4.7 * Stop requiring a live consensus for v3 clients and services * Re-entry into the network is now denied at the Exit level * Fix undefined behavior on our Keccak library * Strip '\r' characters when reading text files on Unix platforms * Handle partial SOCKS5 messages correctly
Bernhard Wiedemann2021-02-05 08:19:53 +00:00