pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/net/tor Updated tor to 0.2.9.10.



details:   https://anonhg.NetBSD.org/pkgsrc/rev/972c4cd0a1fc
branches:  trunk
changeset: 359295:972c4cd0a1fc
user:      wiz <wiz%pkgsrc.org@localhost>
date:      Sun Mar 05 14:55:15 2017 +0000

description:
Updated tor to 0.2.9.10.

Changes in version 0.2.9.10 - 2017-03-01
  Tor 0.2.9.10 backports a security fix for users who build Tor with
  the --enable-expensive-hardening option. It also includes fixes for
  some major issues affecting directory authorities, LibreSSL
  compatibility, and IPv6 correctness.

  The Tor 0.2.9.x release series is now marked as a long-term-support
  series.  We intend to backport security fixes to 0.2.9.x until at
  least January of 2020.

  o Major bugfixes (directory authority, 0.3.0.3-alpha):
    - During voting, when marking a relay as a probable sybil, do not
      clear its BadExit flag: sybils can still be bad in other ways
      too. (We still clear the other flags.) Fixes bug 21108; bugfix
      on 0.2.0.13-alpha.

  o Major bugfixes (IPv6 Exits, backport from 0.3.0.3-alpha):
    - Stop rejecting all IPv6 traffic on Exits whose exit policy rejects
      any IPv6 addresses. Instead, only reject a port over IPv6 if the
      exit policy rejects that port on more than an IPv6 /16 of
      addresses. This bug was made worse by 17027 in 0.2.8.1-alpha,
      which rejected a relay's own IPv6 address by default. Fixes bug
      21357; bugfix on commit 004f3f4e53 in 0.2.4.7-alpha.

  o Major bugfixes (parsing, also in 0.3.0.4-rc):
    - Fix an integer underflow bug when comparing malformed Tor
      versions. This bug could crash Tor when built with
      --enable-expensive-hardening, or on Tor 0.2.9.1-alpha through Tor
      0.2.9.8, which were built with -ftrapv by default. In other cases
      it was harmless. Part of TROVE-2017-001. Fixes bug 21278; bugfix
      on 0.0.8pre1. Found by OSS-Fuzz.

  o Minor features (directory authorities, also in 0.3.0.4-rc):
    - Directory authorities now reject descriptors that claim to be
      malformed versions of Tor. Helps prevent exploitation of
      bug 21278.
    - Reject version numbers with components that exceed INT32_MAX.
      Otherwise 32-bit and 64-bit platforms would behave inconsistently.
      Fixes bug 21450; bugfix on 0.0.8pre1.

  o Minor features (geoip):
    - Update geoip and geoip6 to the February 8 2017 Maxmind GeoLite2
      Country database.

  o Minor features (portability, compilation, backport from 0.3.0.3-alpha):
    - Autoconf now checks to determine if OpenSSL structures are opaque,
      instead of explicitly checking for OpenSSL version numbers. Part
      of ticket 21359.
    - Support building with recent LibreSSL code that uses opaque
      structures. Closes ticket 21359.

  o Minor bugfixes (code correctness, also in 0.3.0.4-rc):
    - Repair a couple of (unreachable or harmless) cases of the risky
      comparison-by-subtraction pattern that caused bug 21278.

  o Minor bugfixes (tor-resolve, backport from 0.3.0.3-alpha):
    - The tor-resolve command line tool now rejects hostnames over 255
      characters in length. Previously, it would silently truncate them,
      which could lead to bugs. Fixes bug 21280; bugfix on 0.0.9pre5.
      Patch by "junglefowl".

diffstat:

 net/tor/Makefile |   4 ++--
 net/tor/distinfo |  10 +++++-----
 2 files changed, 7 insertions(+), 7 deletions(-)

diffs (27 lines):

diff -r 0939fca563cd -r 972c4cd0a1fc net/tor/Makefile
--- a/net/tor/Makefile  Sun Mar 05 14:43:20 2017 +0000
+++ b/net/tor/Makefile  Sun Mar 05 14:55:15 2017 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.117 2017/01/24 08:59:07 wiz Exp $
+# $NetBSD: Makefile,v 1.118 2017/03/05 14:55:15 wiz Exp $
 
-DISTNAME=              tor-0.2.9.9
+DISTNAME=              tor-0.2.9.10
 CATEGORIES=            net security
 MASTER_SITES=          http://www.torproject.org/dist/
 
diff -r 0939fca563cd -r 972c4cd0a1fc net/tor/distinfo
--- a/net/tor/distinfo  Sun Mar 05 14:43:20 2017 +0000
+++ b/net/tor/distinfo  Sun Mar 05 14:55:15 2017 +0000
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.78 2017/01/24 08:59:07 wiz Exp $
+$NetBSD: distinfo,v 1.79 2017/03/05 14:55:15 wiz Exp $
 
-SHA1 (tor-0.2.9.9.tar.gz) = 031bc77666a761ae7bc88cdade8187a3e3758d69
-RMD160 (tor-0.2.9.9.tar.gz) = 2a94b5abb565dc5e508fb6e70a05ea60e53202f3
-SHA512 (tor-0.2.9.9.tar.gz) = cbe7e1f3e503b945f150916b7147cf23d1c32c3660e15aecfe5e2f2baac3a241de665e6ce4e81b81229933eba7f02d4a86e8deeabf2378d40fa83a7036928c9b
-Size (tor-0.2.9.9.tar.gz) = 5534005 bytes
+SHA1 (tor-0.2.9.10.tar.gz) = c3dbf92bab07d0043e3d1959385c0eb110bd2443
+RMD160 (tor-0.2.9.10.tar.gz) = 90b4d7f4cee19f06a7fb63f4f249df52d004e4b8
+SHA512 (tor-0.2.9.10.tar.gz) = c18c4faf18406f04165136f0d70e6bc2896f3f02770beadaab5e7a99441d71b897ae3a14a046eaec99a1bd6d8ad7758b28f7d652588842b77621cdc95d4fb7e1
+Size (tor-0.2.9.10.tar.gz) = 5557586 bytes



Home | Main Index | Thread Index | Old Index