commit 35d6749e30ef62a3667c16a79ae610482e9134ab Author: Roger Dingledine arma@torproject.org Date: Sat Sep 8 16:59:01 2018 -0400
synchronize 0.3.4.8 changelog --- ChangeLog | 12 ++++++------ ReleaseNotes | 2 +- 2 files changed, 7 insertions(+), 7 deletions(-)
diff --git a/ChangeLog b/ChangeLog index 0a4313741..a254c0da5 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,8 +1,8 @@ Changes in version 0.3.4.8 - 2018-09-10 Tor 0.3.4.8 is the first stable release in its series; it includes - several compilation and portability fixes. + compilation and portability fixes.
- The Tor 0.3.4 series includes several improvements for running Tor in + The Tor 0.3.4 series includes improvements for running Tor in low-power and embedded environments, which should help performance in general. We've begun work on better modularity, and included preliminary changes on the directory authority side to accommodate a new bandwidth @@ -12,7 +12,7 @@ Changes in version 0.3.4.8 - 2018-09-10 our anti-denial-of-service code.
Below are the changes since 0.3.4.7-rc. For a complete list of changes - since 0.3.3.6, see the ReleaseNotes file. + since 0.3.3.9, see the ReleaseNotes file.
o Minor features (compatibility): - Tell OpenSSL to maintain backward compatibility with previous @@ -38,8 +38,8 @@ Changes in version 0.3.4.8 - 2018-09-10
o Minor bugfixes (continuous integration): - Disable gcc hardening in Appveyor Windows 64-bit builds. As of - August 29, 2018, Appveyor images come with gcc 8.2.0 by default. - Executables compiled for 64-bit windows with this version of gcc + August 29 2018, Appveyor images come with gcc 8.2.0 by default. + Executables compiled for 64-bit Windows with this version of gcc crash when Tor's --enable-gcc-hardening flag is set. Fixes bug 27460; bugfix on 0.3.4.1-alpha. - When a Travis build fails, and showing a log fails, keep trying to @@ -117,7 +117,7 @@ Changes in version 0.3.4.7-rc - 2018-08-24 failure. Fixes bug 26948; bugfix on 0.3.3.1-alpha.
o Minor bugfixes (linux seccomp2 sandbox): - - Fix a bug in out sandboxing rules for the openat() syscall. + - Fix a bug in our sandboxing rules for the openat() syscall. Previously, no openat() call would be permitted, which would break filesystem operations on recent glibc versions. Fixes bug 25440; bugfix on 0.2.9.15. Diagnosis and patch from Daniel Pinto. diff --git a/ReleaseNotes b/ReleaseNotes index 0ee587c48..7a91c87ef 100644 --- a/ReleaseNotes +++ b/ReleaseNotes @@ -375,7 +375,7 @@ Changes in version 0.3.4.8 - 2018-09-10 o Minor bugfixes (Linux seccomp2 sandbox): - Allow the nanosleep() system call, which glibc uses to implement sleep() and usleep(). Fixes bug 24969; bugfix on 0.2.5.1-alpha. - - Fix a bug in out sandboxing rules for the openat() syscall. + - Fix a bug in our sandboxing rules for the openat() syscall. Previously, no openat() call would be permitted, which would break filesystem operations on recent glibc versions. Fixes bug 25440; bugfix on 0.2.9.15. Diagnosis and patch from Daniel Pinto.
tor-commits@lists.torproject.org