[tor-commits] [tor/release-0.4.4] 0.4.4.5 ReleaseNotes: remove items that appeared in 0.4.3.6

nickm at torproject.org nickm at torproject.org
Mon Sep 14 17:45:13 UTC 2020


commit 8800421a7c30dbf786774479c315e9d2fe0d0453
Author: Nick Mathewson <nickm at torproject.org>
Date:   Mon Sep 14 13:40:48 2020 -0400

    0.4.4.5 ReleaseNotes: remove items that appeared in 0.4.3.6
---
 ReleaseNotes | 51 ---------------------------------------------------
 1 file changed, 51 deletions(-)

diff --git a/ReleaseNotes b/ReleaseNotes
index 0ea4c0a6a4..8327abcaa4 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -59,12 +59,6 @@ Changes in version 0.4.4.5 - 2020-09-15
       by using the HiddenServiceOnionBalanceInstance torrc option.
       Closes ticket 32709.
 
-  o Major bugfixes (NSS, security):
-    - Fix a crash due to an out-of-bound memory access when Tor is
-      compiled with NSS support. Fixes bug 33119; bugfix on
-      0.3.5.1-alpha. This issue is also tracked as TROVE-2020-001
-      and CVE-2020-15572.
-
   o Major bugfixes (NSS):
     - When running with NSS enabled, make sure that NSS knows to expect
       nonblocking sockets. Previously, we set our TCP sockets as
@@ -231,20 +225,10 @@ Changes in version 0.4.4.5 - 2020-09-15
     - Add support for console control signals like Ctrl+C in Windows.
       Closes ticket 34211. Patch from Damon Harris (TheDcoder).
 
-  o Minor bugfix (CI, Windows):
-    - Use the correct 64-bit printf format when compiling with MINGW on
-      Appveyor. Fixes bug 40026; bugfix on 0.3.5.5-alpha.
-
   o Minor bugfix (onion service v3 client):
     - Remove a BUG() warning that could occur naturally. Fixes bug
       34087; bugfix on 0.3.2.1-alpha.
 
-  o Minor bugfix (onion service v3):
-    - Prevent an assert() that would occur when cleaning the client
-      descriptor cache, and attempting to close circuits for a non-
-      decrypted descriptor (lacking client authorization). Fixes bug
-      33458; bugfix on 0.4.2.1-alpha.
-
   o Minor bugfix (refactoring):
     - Lift circuit_build_times_disabled() out of the
       circuit_expire_building() loop, to save CPU time when there are
@@ -255,16 +239,6 @@ Changes in version 0.4.4.5 - 2020-09-15
       returning the F6 ExtendedErrors code. Fixes bug 33873; bugfix
       on 0.4.3.1-alpha.
 
-  o Minor bugfixes (client performance):
-    - Resume use of preemptively-built circuits when UseEntryGuards is
-      set to 0. We accidentally disabled this feature with that config
-      setting, leading to slower load times. Fixes bug 34303; bugfix
-      on 0.3.3.2-alpha.
-
-  o Minor bugfixes (compiler warnings):
-    - Fix a compiler warning on platforms with 32-bit time_t values.
-      Fixes bug 40028; bugfix on 0.3.2.8-rc.
-
   o Minor bugfixes (control port, onion service):
     - Consistently use 'address' in "Invalid v3 address" response to
       ONION_CLIENT_AUTH commands. Previously, we would sometimes say
@@ -309,11 +283,6 @@ Changes in version 0.4.4.5 - 2020-09-15
       IPv6 address with the IPv4 address from the consensus. Fixes bug
       33899; bugfix on 0.3.1.1-alpha.
 
-  o Minor bugfixes (linux seccomp sandbox nss):
-    - Fix a startup crash when tor is compiled with --enable-nss and
-      sandbox support is enabled. Fixes bug 34130; bugfix on
-      0.3.5.1-alpha. Patch by Daniel Pinto.
-
   o Minor bugfixes (linux seccomp2 sandbox):
     - Fix a regression on sandboxing rules for the openat() syscall. The
       fix for bug 25440 fixed the problem on systems with glibc >= 2.27
@@ -326,11 +295,6 @@ Changes in version 0.4.4.5 - 2020-09-15
       2.21 and 2.26. Patch from Daniel Pinto. Fixes bug 40020; bugfix
       on 0.3.5.11.
 
-  o Minor bugfixes (logging):
-    - Downgrade a noisy log message that could occur naturally when
-      receiving an extrainfo document that we no longer want. Fixes bug
-      16016; bugfix on 0.2.6.3-alpha.
-
   o Minor bugfixes (logging, testing):
     - Make all of tor's assertion macros support the ALL_BUGS_ARE_FATAL
       and DISABLE_ASSERTS_IN_UNIT_TESTS debugging modes. (IF_BUG_ONCE()
@@ -345,10 +309,6 @@ Changes in version 0.4.4.5 - 2020-09-15
     - Better guard against growing a buffer past its maximum 2GB in
       size. Fixes bug 33131; bugfix on 0.3.0.4-rc.
 
-  o Minor bugfixes (manual page):
-    - Update the man page to reflect that MinUptimeHidServDirectoryV2
-      defaults to 96 hours. Fixes bug 34299; bugfix on 0.2.6.3-alpha.
-
   o Minor bugfixes (onion service v3):
     - Remove a BUG() warning that could trigger in certain unlikely
       edge-cases. Fixes bug 34086; bugfix on 0.3.2.1-alpha.
@@ -367,10 +327,6 @@ Changes in version 0.4.4.5 - 2020-09-15
       opening an intro circuit as a client. Fixes bug 34084; bugfix
       on 0.3.2.1-alpha.
 
-  o Minor bugfixes (portability):
-    - Fix a portability error in the configure script, where we were
-      using "==" instead of "=". Fixes bug 34233; bugfix on 0.4.3.5.
-
   o Minor bugfixes (protocol versions):
     - Sort tor's supported protocol version lists, as recommended by the
       tor directory specification. Fixes bug 33285; bugfix
@@ -399,11 +355,6 @@ Changes in version 0.4.4.5 - 2020-09-15
       connections we need to see before we warn. Fixes bug 33880; bugfix
       on 0.3.1.1-alpha.
 
-  o Minor bugfixes (relays):
-    - Stop advertising incorrect IPv6 ORPorts in relay and bridge
-      descriptors, when the IPv6 port was configured as "auto". Fixes
-      bug 32588; bugfix on 0.2.3.9-alpha.
-
   o Minor bugfixes (tests):
     - Fix the behavior of the rend_cache/clean_v2_descs_as_dir when run
       on its own. Previously, it would exit with an error. Fixes bug
@@ -439,8 +390,6 @@ Changes in version 0.4.4.5 - 2020-09-15
     - Document the limitations of using %include on config files with
       seccomp sandbox enabled. Fixes documentation bug 34133; bugfix on
       0.3.1.1-alpha. Patch by Daniel Pinto.
-    - Fix several doxygen warnings related to imbalanced groups. Closes
-      ticket 34255.
 
   o Removed features:
     - Our "check-local" test target no longer tries to use the





More information about the tor-commits mailing list