[tor-commits] [tor/master] release-notes for 0.2.8.9

nickm at torproject.org nickm at torproject.org
Mon Oct 17 20:12:58 UTC 2016


commit 8b0755c9bb296ae210e83b88e099d52e40b6f2aa
Author: Nick Mathewson <nickm at torproject.org>
Date:   Mon Oct 17 15:00:58 2016 -0400

    release-notes for 0.2.8.9
---
 ReleaseNotes | 22 ++++++++++++++++++++++
 1 file changed, 22 insertions(+)

diff --git a/ReleaseNotes b/ReleaseNotes
index 5361787..af61a4d 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -2,6 +2,28 @@ This document summarizes new features and bugfixes in each stable release
 of Tor. If you want to see more detailed descriptions of the changes in
 each development snapshot, see the ChangeLog file.
 
+Changes in version 0.2.8.9 - 2016-10-17
+  Tor 0.2.8.9 backports a fix for a security hole in previous versions
+  of Tor that would allow a remote attacker to crash a Tor client,
+  hidden service, relay, or authority. All Tor users should upgrade to
+  this version, or to 0.2.9.4-alpha. Patches will be released for older
+  versions of Tor.
+
+  o Major features (security fixes, also in 0.2.9.4-alpha):
+    - Prevent a class of security bugs caused by treating the contents
+      of a buffer chunk as if they were a NUL-terminated string. At
+      least one such bug seems to be present in all currently used
+      versions of Tor, and would allow an attacker to remotely crash
+      most Tor instances, especially those compiled with extra compiler
+      hardening. With this defense in place, such bugs can't crash Tor,
+      though we should still fix them as they occur. Closes ticket
+      20384 (TROVE-2016-10-001).
+
+  o Minor features (geoip):
+    - Update geoip and geoip6 to the October 4 2016 Maxmind GeoLite2
+      Country database.
+
+
 Changes in version 0.2.8.8 - 2016-09-23
   Tor 0.2.8.8 fixes two crash bugs present in previous versions of the
   0.2.8.x series. Relays running 0.2.8.x should upgrade, as should users



More information about the tor-commits mailing list