[tor-commits] [tor/release-0.2.9] minor tweaks to the release blurb

arma at torproject.org arma at torproject.org
Mon Jan 23 14:37:22 UTC 2017


commit 56788a2489127072d513cf4baf35a8ff475f3c7b
Author: Roger Dingledine <arma at torproject.org>
Date:   Mon Jan 23 09:37:06 2017 -0500

    minor tweaks to the release blurb
---
 ChangeLog    | 14 +++++++-------
 ReleaseNotes | 42 ++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 49 insertions(+), 7 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index c372631dc..512c245 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,18 +1,18 @@
 Changes in version 0.2.9.9 - 2017-01-23
   Tor 0.2.9.9 fixes a denial-of-service bug where an attacker could
-  cause relays and clients (including hidden services) to crash, even if
-  they were not built with the --enable-expensive-hardening option. This
-  bug affects all 0.2.9.x versions, and also affects 0.3.0.1-alpha: all
-  relays running an affected version should upgrade.
+  cause relays and clients to crash, even if they were not built with
+  the --enable-expensive-hardening option. This bug affects all 0.2.9.x
+  versions, and also affects 0.3.0.1-alpha: all relays running an affected
+  version should upgrade.
 
   This release also resolves a client-side onion service reachability
-  bug, and relays a pair of small portability issues.
+  bug, and resolves a pair of small portability issues.
 
   o Major bugfixes (security):
     - Downgrade the "-ftrapv" option from "always on" to "only on when
       --enable-expensive-hardening is provided." This hardening option,
-      like others, can turn survivable bugs into crashes--and having it
-      on by default made a (relatively harmless) integer overflow bug
+      like others, can turn survivable bugs into crashes -- and having
+      it on by default made a (relatively harmless) integer overflow bug
       into a denial-of-service bug. Fixes bug 21278 (TROVE-2017-001);
       bugfix on 0.2.9.1-alpha.
 
diff --git a/ReleaseNotes b/ReleaseNotes
index ee58f6f..30b2268 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -2,6 +2,48 @@ This document summarizes new features and bugfixes in each stable release
 of Tor. If you want to see more detailed descriptions of the changes in
 each development snapshot, see the ChangeLog file.
 
+Changes in version 0.2.9.9 - 2017-01-23
+  Tor 0.2.9.9 fixes a denial-of-service bug where an attacker could
+  cause relays and clients to crash, even if they were not built with
+  the --enable-expensive-hardening option. This bug affects all 0.2.9.x
+  versions, and also affects 0.3.0.1-alpha: all relays running an affected
+  version should upgrade.
+
+  This release also resolves a client-side onion service reachability
+  bug, and resolves a pair of small portability issues.
+
+  o Major bugfixes (security):
+    - Downgrade the "-ftrapv" option from "always on" to "only on when
+      --enable-expensive-hardening is provided." This hardening option,
+      like others, can turn survivable bugs into crashes -- and having
+      it on by default made a (relatively harmless) integer overflow bug
+      into a denial-of-service bug. Fixes bug 21278 (TROVE-2017-001);
+      bugfix on 0.2.9.1-alpha.
+
+  o Major bugfixes (client, onion service):
+    - Fix a client-side onion service reachability bug, where multiple
+      socks requests to an onion service (or a single slow request)
+      could cause us to mistakenly mark some of the service's
+      introduction points as failed, and we cache that failure so
+      eventually we run out and can't reach the service. Also resolves a
+      mysterious "Remote server sent bogus reason code 65021" log
+      warning. The bug was introduced in ticket 17218, where we tried to
+      remember the circuit end reason as a uint16_t, which mangled
+      negative values. Partially fixes bug 21056 and fixes bug 20307;
+      bugfix on 0.2.8.1-alpha.
+
+  o Minor features (geoip):
+    - Update geoip and geoip6 to the January 4 2017 Maxmind GeoLite2
+      Country database.
+
+  o Minor bugfixes (portability):
+    - Avoid crashing when Tor is built using headers that contain
+      CLOCK_MONOTONIC_COARSE, but then tries to run on an older kernel
+      without CLOCK_MONOTONIC_COARSE. Fixes bug 21035; bugfix
+      on 0.2.9.1-alpha.
+    - Fix Libevent detection on platforms without Libevent 1 headers
+      installed. Fixes bug 21051; bugfix on 0.2.9.1-alpha.
+
 
 Changes in version 0.2.9.8 - 2016-12-19
   Tor 0.2.9.8 is the first stable release of the Tor 0.2.9 series.



More information about the tor-commits mailing list