Hi, all! There is a new stable release of the Tor source code, with fixes for a security bug. You should probably upgrade as packages become available.
(If you are about to reply saying "please take me off this list", instead please follow these instructions: https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-announce/ . You will have to enter the actual email address you used to subscribe.)
You can download the source from the usual place on the website. Packages should be up within a few days.
If you maintain an older version of Tor, you can find backported patches for this fix at https://trac.torproject.org/projects/tor/ticket/20384
====
Changes in version 0.2.8.9 - 2016-10-17 Tor 0.2.8.9 backports a fix for a security hole in previous versions of Tor that would allow a remote attacker to crash a Tor client, hidden service, relay, or authority. All Tor users should upgrade to this version, or to 0.2.9.4-alpha. Patches will be released for older versions of Tor.
o Major features (security fixes, also in 0.2.9.4-alpha): - Prevent a class of security bugs caused by treating the contents of a buffer chunk as if they were a NUL-terminated string. At least one such bug seems to be present in all currently used versions of Tor, and would allow an attacker to remotely crash most Tor instances, especially those compiled with extra compiler hardening. With this defense in place, such bugs can't crash Tor, though we should still fix them as they occur. Closes ticket 20384 (TROVE-2016-10-001).
o Minor features (geoip): - Update geoip and geoip6 to the October 4 2016 Maxmind GeoLite2 Country database.
tor-announce@lists.torproject.org