[tor-commits] [tor/master] Remove changes files that predate current origin/release-0.2.2

nickm at torproject.org nickm at torproject.org
Mon Feb 21 19:52:39 UTC 2011


commit e9fb50c797b89556807f77380e8d7127bd5df385
Author: Nick Mathewson <nickm at torproject.org>
Date:   Mon Feb 21 14:22:12 2011 -0500

    Remove changes files that predate current origin/release-0.2.2
---
 changes/bug1074-part2           |    6 ------
 changes/bug2004                 |    4 ----
 changes/bug2060                 |    4 ----
 changes/bug2081_followup        |    9 ---------
 changes/bug2097-more            |    6 ------
 changes/bug2146.1               |    4 ----
 changes/bug2181                 |    4 ----
 changes/bug2190                 |   11 -----------
 changes/bug2203                 |    6 ------
 changes/bug2210                 |    5 -----
 changes/bug2235                 |    3 ---
 changes/bug2279                 |   15 ---------------
 changes/bug2305                 |    5 -----
 changes/bug2313                 |    4 ----
 changes/bug2314                 |    4 ----
 changes/bug2317                 |    9 ---------
 changes/bug2324                 |    4 ----
 changes/bug2324_uncompress      |    5 -----
 changes/bug2326                 |    6 ------
 changes/bug2328                 |    9 ---------
 changes/bug2330                 |    7 -------
 changes/bug2331                 |    7 -------
 changes/bug2332                 |    4 ----
 changes/bug2337                 |    3 ---
 changes/bug2346                 |    6 ------
 changes/bug2352                 |    6 ------
 changes/bug2358                 |    5 -----
 changes/bug2363                 |    6 ------
 changes/bug2364                 |    4 ----
 changes/bug2378                 |    8 --------
 changes/bug2384                 |    6 ------
 changes/bug2408                 |    6 ------
 changes/bug2409                 |    4 ----
 changes/bug2432                 |    5 -----
 changes/bug2433                 |    5 -----
 changes/bug2470                 |    5 -----
 changes/bytecount               |    5 -----
 changes/dhparam                 |    3 ---
 changes/fix2195-fix             |    6 ------
 changes/gabelmoo-newip          |    3 ---
 changes/geoip-dec2010           |    3 ---
 changes/geoip-feb2011           |    3 ---
 changes/geoip-jan2011           |    3 ---
 changes/mingw-openssl098m       |    3 ---
 changes/policy_summarize-assert |    6 ------
 changes/remove-website          |    5 -----
 changes/routerparse_maxima      |    4 ----
 changes/security_bug            |    5 -----
 changes/task2196                |    5 -----
 changes/tolen_asserts           |    8 --------
 50 files changed, 0 insertions(+), 272 deletions(-)

diff --git a/changes/bug1074-part2 b/changes/bug1074-part2
deleted file mode 100644
index 6644f49..0000000
--- a/changes/bug1074-part2
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Major bugfixes:
-    - Stop sending a CLOCK_SKEW controller status event whenever
-      we fetch directory information from a relay that has a wrong clock.
-      Instead, only inform the controller when it's a trusted authority
-      that claims our clock is wrong. Bugfix on tor-0.1.2.6-alpha;
-      fixes the other half of bug 1074.
diff --git a/changes/bug2004 b/changes/bug2004
deleted file mode 100644
index 4fd6c91..0000000
--- a/changes/bug2004
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features
-    - Log less aggressively about circuit timeout changes, and improve some
-      other circuit timeout messages.  Resolves bug 2004.
-
diff --git a/changes/bug2060 b/changes/bug2060
deleted file mode 100644
index eb95aed..0000000
--- a/changes/bug2060
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features
-    - Make sure to disable DirPort if running as a bridge.  DirPorts aren't
-      used on bridges, and it makes bridge scanning way too easy.
-
diff --git a/changes/bug2081_followup b/changes/bug2081_followup
deleted file mode 100644
index a53227c..0000000
--- a/changes/bug2081_followup
+++ /dev/null
@@ -1,9 +0,0 @@
-  o Minor features (authorities)
-    - Directory authorities now reject relays running any versions of
-      Tor between 0.2.1.3-alpha and 0.2.1.18 inclusive; they have
-      known bugs that keep RELAY_EARLY cells from working on rendezvous
-      circuits.  Followup to fix for bug 2081.
-    - Directory authorities now reject relays running any version of Tor
-      older than 0.2.0.26-rc.  That is the earliest version that fetches
-      current directory information correctly.  Fix for bug 2156.
-
diff --git a/changes/bug2097-more b/changes/bug2097-more
deleted file mode 100644
index 52351cc..0000000
--- a/changes/bug2097-more
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes:
-    - Fix a logic error in directory_fetches_from_authorities that
-      would cause all _non_-exits refusing single-hop-like circuits to
-      fetch from authorities, when we wanted to have _exits_ fetch
-      from authorities.  Fix by boboper; fixes more of 2097; bugfix on
-      0.2.2.16-alpha.
diff --git a/changes/bug2146.1 b/changes/bug2146.1
deleted file mode 100644
index 5b91c59..0000000
--- a/changes/bug2146.1
+++ /dev/null
@@ -1,4 +0,0 @@
-  - Major bugfixes:
-    o Fix a bug that could break accounting on 64-bit systems with large
-      time_t values, making them hibernate for impossibly long intervals.
-      Bugfix on 0.0.9pre6; fix for bug 2146; fix by boboper.
diff --git a/changes/bug2181 b/changes/bug2181
deleted file mode 100644
index 0a09548..0000000
--- a/changes/bug2181
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features
-    - Log a little more clearly about the times at which we're no longer
-      accepting new connections.  Resolves bug 2181.
-
diff --git a/changes/bug2190 b/changes/bug2190
deleted file mode 100644
index 0591acb..0000000
--- a/changes/bug2190
+++ /dev/null
@@ -1,11 +0,0 @@
-  o Minor bugfixes
-    - Prevent calls from Libevent from inside Libevent log handlers.
-      This had potential to cause a nasty set of crashes, especially if
-      running Libevent with debug logging enabled, and running Tor
-      with a controller watching for low-severity log messages.
-      Bugfix on 0.1.0.2-rc.  Fixes bug 2190.
-    - Make Libevent log messages get delievered to controllers later,
-      and not from inside the Libevent log handler.  This prevents
-      unsafe reentrant Libevent calls while still letting the log
-      messages get through.
-
diff --git a/changes/bug2203 b/changes/bug2203
deleted file mode 100644
index 9cfbedf..0000000
--- a/changes/bug2203
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes:
-    - Clients should not weight BadExit nodes as Exits in their node
-      selection. Similarly, directory authorities should not count
-      BadExit bandwidth as Exit bandwidth when computing bandwidth-weights.
-      Bugfix on 0.2.2.10-alpha; fixes bug 2203.
-
diff --git a/changes/bug2210 b/changes/bug2210
deleted file mode 100644
index fe1c049..0000000
--- a/changes/bug2210
+++ /dev/null
@@ -1,5 +0,0 @@
-  o ?? bugfixes:
-    - Fix a bug that would cause newer streams on a given circuit to
-      get preference when reading bytes from the network.  Fixes bug
-      2210.  Fix by Mashael AlSabah.  This bug was introduced before
-      the first Tor release, in svn revision r152.
diff --git a/changes/bug2235 b/changes/bug2235
deleted file mode 100644
index 0c3bafa..0000000
--- a/changes/bug2235
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes
-    - Avoid crashes when AccountingMax is set on clients.  Fixes bug 2235;
-      Bugfix on 0.2.2.18-alpha.  Diagnosed by boboper.
diff --git a/changes/bug2279 b/changes/bug2279
deleted file mode 100644
index d313009..0000000
--- a/changes/bug2279
+++ /dev/null
@@ -1,15 +0,0 @@
-  o Minor bugfixes
-    - Avoid a double mark-for-free warning when failing to attach a
-      transparent proxy connection.  Fixes bug 2279.  Bugfix on
-      Tor 0.1.2.1 alpha.
-
-  o Minor features
-    - Detect attempts at the client side to open connections to private
-      IP addresses (like 127.0.0.1, 10.0.0.1, and so on) with a randomly
-      chosen exit node.  Attempts to do so are always ill-defined, generally
-      prevented by exit policies, and usually in error.  This will also
-      help to detect loops in transparent proxy configurations.  You can
-      disable this feature by setting "ClientRejectInternalAddresses 0"
-      in your torrc.
-
-
diff --git a/changes/bug2305 b/changes/bug2305
deleted file mode 100644
index c979d5f..0000000
--- a/changes/bug2305
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Build changes
-    - Tor does not build packages correctly with Automake 1.6 and earlier;
-      added a check to Makefile.am to make sure that we're building with
-      Automake 1.7 or later.
-
diff --git a/changes/bug2313 b/changes/bug2313
deleted file mode 100644
index 0ffbe4a..0000000
--- a/changes/bug2313
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes
-    - Fix compilation on mingw when a pthreads compatibility library
-      has been installed.  (We don't want to use it, so we shouldn't
-      be including pthread.h.)  Fixes bug 2313; bugfix on 0.1.0.1-rc.
diff --git a/changes/bug2314 b/changes/bug2314
deleted file mode 100644
index 41a2328..0000000
--- a/changes/bug2314
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Fix a bunch of compile warnings revealed by mingw with gcc 4.5. Fixes
-      bug 2314.
-
diff --git a/changes/bug2317 b/changes/bug2317
deleted file mode 100644
index 0b9366c..0000000
--- a/changes/bug2317
+++ /dev/null
@@ -1,9 +0,0 @@
-  o Major features:
-    - Introduce minimum/maximum values that a client is going to believe
-      in a consensus. This helps to avoid crashes or worse when a param
-      has a weird value.
-
-  o Major bugfixes:
-    - Prevent crash/heap corruption when cbtnumnodes consensus parameter is
-      set to 0 or large values. Fixes bug 2317.
-
diff --git a/changes/bug2324 b/changes/bug2324
deleted file mode 100644
index eefc837..0000000
--- a/changes/bug2324
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes
-    - Add a check for SIZE_T_MAX to tor_realloc to try to avoid
-      underflow errors there too.  Fixes bug 2324.
-
diff --git a/changes/bug2324_uncompress b/changes/bug2324_uncompress
deleted file mode 100644
index 223a3ce..0000000
--- a/changes/bug2324_uncompress
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Major bugfixes (security):
-    - Prevent a DoS attack by disallowing any zlib-compressed data
-      whose compression factor is implausibly high.  Fixes the
-      second part of bug2324; found by doors.
-
diff --git a/changes/bug2326 b/changes/bug2326
deleted file mode 100644
index 239a383..0000000
--- a/changes/bug2326
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes
-    - Fix a bug where we would assert if we ever had a
-      cached-descriptors.new file (or another file read directly into
-      memory) of exactly SIZE_T_CEILING bytes.  Found by doors; fixes
-      bug 2326; bugfix on 0.2.1.25.
-
diff --git a/changes/bug2328 b/changes/bug2328
deleted file mode 100644
index fee80a1..0000000
--- a/changes/bug2328
+++ /dev/null
@@ -1,9 +0,0 @@
-  o Minor bugfixes
-    - Fix a bug where we would declare that we had run out of virtual
-      addresses when the address space was only half-exhausted.  Bugfix
-      on 0.1.2.1-alpha.
-    - Correctly handle the case where AutomapHostsOnResolve is set but no
-      virtual addresses are available.  Fixes bug2328, bugfix on
-      0.1.2.1-alpha.  Bug found by doorss.
-    - Correctly handle wrapping around to when we run out of virtual address
-      space.  Found by cypherpunks, bugfix on 0.2.0.5-alpha.
diff --git a/changes/bug2330 b/changes/bug2330
deleted file mode 100644
index fc0c4d8..0000000
--- a/changes/bug2330
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Minor bugfixes
-    - Handle SOCKS messages longer than 128 bytes long correctly, rather
-      than waiting forever for them to finish.  Fixes bug 2330.  Bugfix on
-      0.2.0.16-alpha.  Found by doorss.
-
-
-
diff --git a/changes/bug2331 b/changes/bug2331
deleted file mode 100644
index 9940b59..0000000
--- a/changes/bug2331
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Minor bugfixes:
-    - Add assertions to check for overflow in arguments to
-      base32_encode and base32_decode; fix a signed-unsigned
-      comparison there too.  These bugs are not actually reachable in
-      Tor, but it's good to prevent future errors too.  Found by
-      doorss.
-
diff --git a/changes/bug2332 b/changes/bug2332
deleted file mode 100644
index 5f73ddd..0000000
--- a/changes/bug2332
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes
-    - Fix a bug with handling misformed replies to reverse DNS lookup
-      requests in DNSPort.  Bugfix on Tor 0.2.0.1-alpha.  Related to a bug
-      reported by doorss.
diff --git a/changes/bug2337 b/changes/bug2337
deleted file mode 100644
index a4f052d..0000000
--- a/changes/bug2337
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes
-    - Detect broken platforms with a signed size_t, and refuse to
-      build there.  Found and analyzed by doorss and rransom.
diff --git a/changes/bug2346 b/changes/bug2346
deleted file mode 100644
index 0f78b84..0000000
--- a/changes/bug2346
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor features
-    - If writing the state file to disk fails, wait up to an hour
-      before retrying again.  (Our old code would retry the write
-      immediately.)  Fixes bug 2346.  Bugfix on Tor 0.1.1.3-alpha.
-
-
diff --git a/changes/bug2352 b/changes/bug2352
deleted file mode 100644
index 744dbdb..0000000
--- a/changes/bug2352
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes
-    - Fix some potential asserts and partsing issues with grossly
-      malformed router caches.  Fixes bug 2352.  Found by doorss.
-      Bugfix on Tor 0.2.1.27.
-
-
diff --git a/changes/bug2358 b/changes/bug2358
deleted file mode 100644
index 5e44bb9..0000000
--- a/changes/bug2358
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor features
-    - Enable Address Space Layout Randomization (ASLR) and Data Execution
-      Prevention (DEP) by default on Windows to make it harder for
-      attackers to exploit vulnerabilities.  Patch from John Brooks.
- 
diff --git a/changes/bug2363 b/changes/bug2363
deleted file mode 100644
index 179925f..0000000
--- a/changes/bug2363
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes
-    - Correctly detect failures to create DNS requests when using Libevent
-      versions before v2.  (Before Libevent 2, we used our own evdns
-      implementation.  Its return values for Libevent's evdns_resolve_*()
-      functions are not consistent with those from Libevent.) Found by
-      Lodger; fixes bug 2363; bugfix on 0.2.2.6-alpha.
diff --git a/changes/bug2364 b/changes/bug2364
deleted file mode 100644
index 37de6ef..0000000
--- a/changes/bug2364
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Documentation
-    - Document the default socks host and port (127.0.0.1:9050) for
-      tor-resolve.
-
diff --git a/changes/bug2378 b/changes/bug2378
deleted file mode 100644
index 2279688..0000000
--- a/changes/bug2378
+++ /dev/null
@@ -1,8 +0,0 @@
-  o Minor bugfixes
-    - Correctly detect failure to allocate an OpenSSL BIO.  Fixes bug 2378;
-      found by "cypherpunks".   This bug was introduced before the
-      first Tor release, in svn commit r110.
-
-  o Minor code simplifications and refactorings
-    - Always treat failure to allocate an RSA key as an unrecoverable
-      allocation error.
diff --git a/changes/bug2384 b/changes/bug2384
deleted file mode 100644
index ded5eee..0000000
--- a/changes/bug2384
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes
-    - Zero out a few more keys in memory before freeing them.  Fixes bug
-      2384 and part of bug 2385.  These key instances found by
-      "cypherpunks".  Bugfix on 0.0.2pre9.
-
-
diff --git a/changes/bug2408 b/changes/bug2408
deleted file mode 100644
index 1d2dbf1..0000000
--- a/changes/bug2408
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Major bugfixes
-    - Ignore and warn about "PublishServerDescriptor hidserv" torrc
-      options.  The 'hidserv' argument never controlled publication
-      of hidden service descriptors.  Bugfix on 0.2.0.1-alpha.
-
-
diff --git a/changes/bug2409 b/changes/bug2409
deleted file mode 100644
index 5523458..0000000
--- a/changes/bug2409
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes
-    - Resolve a bug in verifying signatures of directory objects
-      with digests longer than SHA1.  Bugfix on 0.2.2.20-alpha;
-      fixes bug 2409; found by "piebeer".
diff --git a/changes/bug2432 b/changes/bug2432
deleted file mode 100644
index 407c56b..0000000
--- a/changes/bug2432
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor features:
-    - Provide a log message stating which geoip file we're parsing
-      instead of just stating that we're parsing the geoip file.
-      Implements ticket 2432.
-
diff --git a/changes/bug2433 b/changes/bug2433
deleted file mode 100644
index 8e47c4f..0000000
--- a/changes/bug2433
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Major bugfixes:
-    - Don't assert when changing from bridge to relay or vice versa with a controller.
-      The assert happened because we didn't properly initialize our keys in this case.
-      Bugfix on 0.2.2.18, fixes bug 2433. Issue first discovered by bastik.
-
diff --git a/changes/bug2470 b/changes/bug2470
deleted file mode 100644
index 8ff97b7..0000000
--- a/changes/bug2470
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Major bugfixes:
-    - If relays set RelayBandwidthBurst but not RelayBandwidthRate,
-      Tor would ignore their RelayBandwidthBurst setting,
-      potentially using more bandwidth than expected. Bugfix on
-      0.2.0.1-alpha. Reported by Paul Wouters. Fixes bug 2470.
diff --git a/changes/bytecount b/changes/bytecount
deleted file mode 100644
index 50c4d6b..0000000
--- a/changes/bytecount
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes
-    - Fix a off-by-one error in calculating some controller command argument
-      lengths.  Fortunately, this is harmless, the controller code does
-      redundant NUL termination too.  Found by boboper.  Bugfix on
-      0.1.1.1-alpha.
diff --git a/changes/dhparam b/changes/dhparam
deleted file mode 100644
index cb31243..0000000
--- a/changes/dhparam
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor features
-    - Adjust our TLS Diffie-Hellman parameters to match those used by
-      Apache's mod_ssl.
diff --git a/changes/fix2195-fix b/changes/fix2195-fix
deleted file mode 100644
index 9f03c24..0000000
--- a/changes/fix2195-fix
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes:
-    - Do not dereference NULL if a bridge fails to build its
-      extra-info descriptor. Previously, we would have dereferenced
-      NULL. Found by an anonymous commenter on Trac. Bugfix on
-      0.2.2.19-alpha.
-
diff --git a/changes/gabelmoo-newip b/changes/gabelmoo-newip
deleted file mode 100644
index 8e9a19c..0000000
--- a/changes/gabelmoo-newip
+++ /dev/null
@@ -1,3 +0,0 @@
- o Directory authority changes:
-    - Change IP address and ports for gabelmoo (v3 directory authority).
-
diff --git a/changes/geoip-dec2010 b/changes/geoip-dec2010
deleted file mode 100644
index d6247ce..0000000
--- a/changes/geoip-dec2010
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor features:
-    - Update to the December 1 2010 Maxmind GeoLite Country database.
-
diff --git a/changes/geoip-feb2011 b/changes/geoip-feb2011
deleted file mode 100644
index 12eb0ac..0000000
--- a/changes/geoip-feb2011
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor features:
-    - Update to the February 1 2011 Maxmind GeoLite Country database.
-
diff --git a/changes/geoip-jan2011 b/changes/geoip-jan2011
deleted file mode 100644
index b58805a..0000000
--- a/changes/geoip-jan2011
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor features:
-    - Update to the January 1 2011 Maxmind GeoLite Country database.
-
diff --git a/changes/mingw-openssl098m b/changes/mingw-openssl098m
deleted file mode 100644
index b419976..0000000
--- a/changes/mingw-openssl098m
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features
-   - Build correctly on mingw with more recent version of OpenSSL 0.9.8.
-     Patch from mingw-san.
diff --git a/changes/policy_summarize-assert b/changes/policy_summarize-assert
deleted file mode 100644
index 619e8e7..0000000
--- a/changes/policy_summarize-assert
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Major bugfixes (security)
-    - Fix a bounds-checking error that could allow an attacker to
-      remotely crash a directory authority.  Found by piebeer.
-      Bugfix on 0.2.1.5-alpha.
-
-
diff --git a/changes/remove-website b/changes/remove-website
deleted file mode 100644
index ecbfbf9..0000000
--- a/changes/remove-website
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Removed files:
-    - Stop shipping the old doc/website/ directory in the tarball. We
-      changed the website format in late 2010, and what we shipped in
-      0.2.1.26 really wasn't that useful anyway.
-
diff --git a/changes/routerparse_maxima b/changes/routerparse_maxima
deleted file mode 100644
index 340f2c3..0000000
--- a/changes/routerparse_maxima
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes
-    - Check for and reject overly long directory certificates and
-      directory tokens before they have a chance to hit any
-      assertions. Bugfix on 0.2.1.28. Found by doorss.
diff --git a/changes/security_bug b/changes/security_bug
deleted file mode 100644
index 990beee..0000000
--- a/changes/security_bug
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Major bugfixes:
-    - Fix a remotely exploitable bug that could be used to crash instances
-      of Tor remotely by overflowing on the heap.  Remove-code execution
-      hasn't been confirmed, but can't be ruled out.  Obviously, everyone
-      should upgrade.  Bugfix on the 0.1.1 series and later.
diff --git a/changes/task2196 b/changes/task2196
deleted file mode 100644
index e629fcc..0000000
--- a/changes/task2196
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor features:
-    - Report only the top 10 ports in exit-port stats in order not to
-      exceed the maximum extra-info descriptor length of 50 KB. Implements
-      task 2196.
-
diff --git a/changes/tolen_asserts b/changes/tolen_asserts
deleted file mode 100644
index a9834ab..0000000
--- a/changes/tolen_asserts
+++ /dev/null
@@ -1,8 +0,0 @@
-  o Major bugfixes (security)
-    - Fix a heap overflow bug where an adversary could cause heap
-      corruption.  This bug potentially allows remote code execution
-      attacks.  Found by debuger.  Fixes CVE-2011-0427.  Bugfix on
-      0.1.2.10-rc.
-  o Defensive programming
-    - Introduce output size checks on all of our decryption functions.
-



_______________________________________________
tor-commits mailing list
tor-commits at lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits



More information about the tor-commits mailing list