[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [tor/release-0.4.2] final entries for 0.4.2.8 changelog



commit ba3f5a3d882d01f66767f7a5056ede6ab5ed8002
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date:   Thu Jul 9 10:19:52 2020 -0400

    final entries for 0.4.2.8 changelog
---
 ChangeLog           | 25 ++++++++++++++++++++++++-
 changes/bug33119    |  4 ----
 changes/bug40028    |  3 ---
 changes/ticket40026 |  3 ---
 4 files changed, 24 insertions(+), 11 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index b94360e39..151a58099 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,7 +1,22 @@
-Changes in version 0.4.2.8 - 2020-07-??
+Changes in version 0.4.2.8 - 2020-07-09
   Tor 0.4.2.8 backports various fixes from later releases, including
   several that affect usability and portability.
 
+  This release also fixes TROVE-2020-001, a medium-severity denial of
+  service vulnerability affecting all versions of Tor when compiled with
+  the NSS encryption library. (This is not the default configuration.)
+  Using this vulnerability, an attacker could cause an affected Tor
+  instance to crash remotely. This issue is also tracked as CVE-2020-
+  15572. Anybody running a version of Tor built with the NSS library
+  should upgrade to 0.3.5.11, 0.4.2.8, 0.4.3.6, or 0.4.4.2-alpha
+  or later.
+
+  o Major bugfixes (NSS, security, backport from 0.4.4.2-alpha):
+    - Fix a crash due to an out-of-bound memory access when Tor is
+      compiled with NSS support. Fixes bug 33119; bugfix on
+      0.3.5.1-alpha. This issue is also tracked as TROVE-2020-001
+      and CVE-2020-15572.
+
   o Major bugfixes (DoS defenses, bridges, pluggable transport, backport from 0.4.3.4-rc):
     - Fix a bug that was preventing DoS defenses from running on bridges
       with a pluggable transport. Previously, the DoS subsystem was not
@@ -27,6 +42,10 @@ Changes in version 0.4.2.8 - 2020-07-??
       that are failing on Appveyor because of mismatched OpenSSL
       libraries. Part of ticket 33643.
 
+  o Minor bugfix (CI, Windows, backport from 0.4.4.2-alpha):
+    - Use the correct 64-bit printf format when compiling with MINGW on
+      Appveyor. Fixes bug 40026; bugfix on 0.3.5.5-alpha.
+
   o Minor bugfix (relay, configuration, backport from 0.4.3.3-alpha):
     - Warn if the ContactInfo field is not set, and tell the relay
       operator that not having a ContactInfo field set might cause their
@@ -47,6 +66,10 @@ Changes in version 0.4.2.8 - 2020-07-??
     - Fix compilation warnings with GCC 10.0.1. Fixes bug 34077; bugfix
       on 0.4.0.3-alpha.
 
+  o Minor bugfixes (compiler warnings, backport from 0.4.4.2-alpha):
+    - Fix a compiler warning on platforms with 32-bit time_t values.
+      Fixes bug 40028; bugfix on 0.3.2.8-rc.
+
   o Minor bugfixes (controller protocol, backport from 0.4.3.2-alpha):
     - When receiving "ACTIVE" or "DORMANT" signals on the control port,
       report them as SIGNAL events. Previously we would log a bug
diff --git a/changes/bug33119 b/changes/bug33119
deleted file mode 100644
index c976654b2..000000000
--- a/changes/bug33119
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Major bugfixes (NSS):
-    - Fix out-of-bound memory access in `tor_tls_cert_matches_key()` when Tor is
-      compiled with NSS support. Fixes bug 33119; bugfix on 0.3.5.1-alpha. This
-      issue is also tracked as TROVE-2020-001.
diff --git a/changes/bug40028 b/changes/bug40028
deleted file mode 100644
index cfd1ffe51..000000000
--- a/changes/bug40028
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (compiler warnings):
-    - Fix a compiler warning on platforms with 32-bit time_t values.
-      Fixes bug 40028; bugfix on 0.3.2.8-rc.
diff --git a/changes/ticket40026 b/changes/ticket40026
deleted file mode 100644
index f87c2964e..000000000
--- a/changes/ticket40026
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfix (CI, Windows):
-    - Don't use stdio 64 bit printf format when compiling with MINGW on
-      Appveyor. Fixes bug 40026; bugfix on 0.3.5.5-alpha.



_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits