Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/net/tor tor: Update to 0.4.3.6
details: https://anonhg.NetBSD.org/pkgsrc/rev/64fc5f8407c0
branches: trunk
changeset: 435585:64fc5f8407c0
user: leot <leot%pkgsrc.org@localhost>
date: Thu Jul 09 18:08:43 2020 +0000
description:
tor: Update to 0.4.3.6
pkgsrc changes:
- Remove patch-configure: applied upstream
Changes:
Changes in version 0.4.3.6 - 2020-07-09
Tor 0.4.3.6 backports several bugfixes from later releases, including
some affecting usability.
This release also fixes TROVE-2020-001, a medium-severity denial of
service vulnerability affecting all versions of Tor when compiled with
the NSS encryption library. (This is not the default configuration.)
Using this vulnerability, an attacker could cause an affected Tor
instance to crash remotely. This issue is also tracked as CVE-2020-
15572. Anybody running a version of Tor built with the NSS library
should upgrade to 0.3.5.11, 0.4.2.8, 0.4.3.6, or 0.4.4.2-alpha
or later.
o Major bugfixes (NSS, security, backport from 0.4.4.2-alpha):
- Fix a crash due to an out-of-bound memory access when Tor is
compiled with NSS support. Fixes bug 33119; bugfix on
0.3.5.1-alpha. This issue is also tracked as TROVE-2020-001
and CVE-2020-15572.
o Minor bugfix (CI, Windows, backport from 0.4.4.2-alpha):
- Use the correct 64-bit printf format when compiling with MINGW on
Appveyor. Fixes bug 40026; bugfix on 0.3.5.5-alpha.
o Minor bugfixes (client performance, backport from 0.4.4.1-alpha):
- Resume use of preemptively-built circuits when UseEntryGuards is set
to 0. We accidentally disabled this feature with that config
setting, leading to slower load times. Fixes bug 34303; bugfix
on 0.3.3.2-alpha.
o Minor bugfixes (compiler warnings, backport from 0.4.4.2-alpha):
- Fix a compiler warning on platforms with 32-bit time_t values.
Fixes bug 40028; bugfix on 0.3.2.8-rc.
o Minor bugfixes (linux seccomp sandbox, nss, backport from 0.4.4.1-alpha):
- Fix a startup crash when tor is compiled with --enable-nss and
sandbox support is enabled. Fixes bug 34130; bugfix on
0.3.5.1-alpha. Patch by Daniel Pinto.
o Minor bugfixes (logging, backport from 0.4.4.2-alpha):
- Downgrade a noisy log message that could occur naturally when
receiving an extrainfo document that we no longer want. Fixes bug
16016; bugfix on 0.2.6.3-alpha.
o Minor bugfixes (manual page, backport from 0.4.4.1-alpha):
- Update the man page to reflect that MinUptimeHidServDirectoryV2
defaults to 96 hours. Fixes bug 34299; bugfix on 0.2.6.3-alpha.
o Minor bugfixes (onion service v3, backport from 0.4.4.1-alpha):
- Prevent an assert() that would occur when cleaning the client
descriptor cache, and attempting to close circuits for a non-
decrypted descriptor (lacking client authorization). Fixes bug
33458; bugfix on 0.4.2.1-alpha.
o Minor bugfixes (portability, backport from 0.4.4.1-alpha):
- Fix a portability error in the configure script, where we were
using "==" instead of "=". Fixes bug 34233; bugfix on 0.4.3.5.
o Minor bugfixes (relays, backport from 0.4.4.1-alpha):
- Stop advertising incorrect IPv6 ORPorts in relay and bridge
descriptors, when the IPv6 port was configured as "auto". Fixes
bug 32588; bugfix on 0.2.3.9-alpha.
o Documentation (backport from 0.4.4.1-alpha):
- Fix several doxygen warnings related to imbalanced groups. Closes
ticket 34255.
diffstat:
net/tor/Makefile | 4 ++--
net/tor/distinfo | 35 +++++------------------------------
net/tor/patches/patch-configure | 15 ---------------
3 files changed, 7 insertions(+), 47 deletions(-)
diffs (71 lines):
diff -r c437c02cbe53 -r 64fc5f8407c0 net/tor/Makefile
--- a/net/tor/Makefile Thu Jul 09 16:15:18 2020 +0000
+++ b/net/tor/Makefile Thu Jul 09 18:08:43 2020 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.153 2020/05/15 16:39:34 wiz Exp $
+# $NetBSD: Makefile,v 1.154 2020/07/09 18:08:43 leot Exp $
-DISTNAME= tor-0.4.3.5
+DISTNAME= tor-0.4.3.6
CATEGORIES= net security
MASTER_SITES= https://dist.torproject.org/
diff -r c437c02cbe53 -r 64fc5f8407c0 net/tor/distinfo
--- a/net/tor/distinfo Thu Jul 09 16:15:18 2020 +0000
+++ b/net/tor/distinfo Thu Jul 09 18:08:43 2020 +0000
@@ -1,31 +1,6 @@
-$NetBSD: distinfo,v 1.107 2020/05/15 16:39:34 wiz Exp $
+$NetBSD: distinfo,v 1.108 2020/07/09 18:08:43 leot Exp $
-SHA1 (digest-0.7.2.crate) = 5b9c88bbbd10db277eb81489d4fd98222c81f654
-RMD160 (digest-0.7.2.crate) = e1754858a8cc3376e4b1faaa2ab950f5c5a9ff26
-SHA512 (digest-0.7.2.crate) = 8232be4fbc7a77d437933d18423ed6c113abbc84084ceb998fac26413b374266975fd3c00e90131985c800dd0b83ff006dd9e77629d2e6ee19638bd67295ff85
-Size (digest-0.7.2.crate) = 8386 bytes
-SHA1 (generic-array-0.9.0.crate) = 1cd2878b30397e19cd189367dd8a4ea71a14e2ec
-RMD160 (generic-array-0.9.0.crate) = 45975a0df06c24fe628f007f7cd77fc1c8ceb1d9
-SHA512 (generic-array-0.9.0.crate) = e2a00d8856a4231a5c29bae592b2a84b98c70737058104fd67570af1220259994d11cb4506f1a1412f3c8a04576fe2617ef015600f677ecfccc8ff7a07425400
-Size (generic-array-0.9.0.crate) = 10702 bytes
-SHA1 (libc-0.2.39.crate) = 426579d6ce98e82c0531ebff2464582d0aea0567
-RMD160 (libc-0.2.39.crate) = 19f01e69a28f2d606d09eb8a8661e8ddceed782f
-SHA512 (libc-0.2.39.crate) = 4b399306da2f4d85e84db5a0a2212bc784b6ab1fb0d4731b58256e47684b5a244dcad8a12088035985e933ca2880dca5ada7dc822443d1cf474f4e73bbe59aa1
-Size (libc-0.2.39.crate) = 325829 bytes
-SHA1 (rand-0.5.0-pre.2.crate) = e55aa9ab4bb44ac92d40da0d99a64efdb2e33464
-RMD160 (rand-0.5.0-pre.2.crate) = 74a094353fee28574d1ec86b9587ca30701685a0
-SHA512 (rand-0.5.0-pre.2.crate) = 7f7f9c77367c2f6c310ad8f15074b85af615c8c0777a1bcbdd2e56410ea057e932fe20263e747d78e1b940abe02d6ada9e4d66ec743b169eb78895b220f5aa7b
-Size (rand-0.5.0-pre.2.crate) = 132485 bytes
-SHA1 (rand_core-0.2.0-pre.0.crate) = 21ea25e01766a26dbbd71997c5c3f358f3454980
-RMD160 (rand_core-0.2.0-pre.0.crate) = cbd3dc9ad06727ca36c296f4d33ec695e25b7bb9
-SHA512 (rand_core-0.2.0-pre.0.crate) = b14f88e529fe99b7b9774fc8e1233b44192e253a8a27bfc4da1a7ae99104b6b697068bd19faab85df3427e557a5182892f81f481dd89e8eb6921ec390ca752e9
-Size (rand_core-0.2.0-pre.0.crate) = 19211 bytes
-SHA1 (tor-0.4.3.5.tar.gz) = 26664e6bc1c96d751f3e44acbd5ead6bd3e90f53
-RMD160 (tor-0.4.3.5.tar.gz) = 64096bbb8f723b10d93499e016dd72d995d2ce17
-SHA512 (tor-0.4.3.5.tar.gz) = 3ba019d08009ccd288411c35e2db987e17e4f012c363fa51f2d8387b24b21c96f1bd7c210ee126fa81f585a6f75a72cbcb7f32365cfbb0a5dac582459953bb7c
-Size (tor-0.4.3.5.tar.gz) = 7740166 bytes
-SHA1 (typenum-1.9.0.crate) = 76b18bc10204c28798cd32d10fd0df349d4cb5e4
-RMD160 (typenum-1.9.0.crate) = 6468f8efe8e91edac71dfd4e28c46581a2f0d457
-SHA512 (typenum-1.9.0.crate) = 8b72af1e370cf9d9308287baf4fc7c6096c4923d1c52fe0313c23c84077d74196aa4d997ecf195842d8242c871b0fd0da111f7914664be1841c97315e3ba6abb
-Size (typenum-1.9.0.crate) = 57747 bytes
-SHA1 (patch-configure) = f281570d1abb27f1e8f14ef6bbe93eaf13699d7f
+SHA1 (tor-0.4.3.6.tar.gz) = 280c4848ce0b6d6e54b4ee9b97ac099545c39240
+RMD160 (tor-0.4.3.6.tar.gz) = 89ac57a20475f76cefbf6eb061b8b0f21b3dd5c2
+SHA512 (tor-0.4.3.6.tar.gz) = f4ab0788d27b3eab40853dde31eaf087ac84616fc3488973e7d01f4dbd3e71ba6ce3a3afcf0c6272223897d0a9c1556aa26dbc4d9b98cc5b43dd729d20a2fcca
+Size (tor-0.4.3.6.tar.gz) = 7745954 bytes
diff -r c437c02cbe53 -r 64fc5f8407c0 net/tor/patches/patch-configure
--- a/net/tor/patches/patch-configure Thu Jul 09 16:15:18 2020 +0000
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,15 +0,0 @@
-$NetBSD: patch-configure,v 1.1 2020/05/15 16:39:34 wiz Exp $
-
-Avoid unportable test(1) operator.
-
---- configure.orig 2020-05-14 15:53:13.000000000 +0000
-+++ configure
-@@ -7746,7 +7746,7 @@ fi
- $as_echo "$tor_cv_c_attr_fallthrough" >&6; }
- CFLAGS="$saved_CFLAGS"
-
--if test "$tor_cv_c_attr_fallthrough" == "yes"; then
-+if test "$tor_cv_c_attr_fallthrough" = "yes"; then
-
- $as_echo "#define HAVE_ATTR_FALLTHROUGH 1" >>confdefs.h
-
Home |
Main Index |
Thread Index |
Old Index