View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/tor
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/debian/dsc 2019-07-28 16:44:54 UTC 2019-07-28
DSC file for 0.4.1.4-rc-1

Author: Ubuntu Git Importer
Author Date: 2019-07-28 16:44:54 UTC

DSC file for 0.4.1.4-rc-1

debian/experimental 2019-07-28 10:27:04 UTC 2019-07-28
Import patches-unapplied version 0.4.1.4-rc-1 to debian/experimental

Author: Peter Palfrader
Author Date: 2019-07-26 07:32:22 UTC

Import patches-unapplied version 0.4.1.4-rc-1 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: 6263e528cb510ef90e551e3b76c25c93cb63752c

New changelog entries:
  * New upstream version.
  * Use start-stop-daemon in the init script instead of ps. Using
    ps would require us to depend on procps when all we want is to
    check if a process exists (closes: #932125).
  * Add untested/unsupported runit support (closes: #930113).
    Use the patch provided there, except also fix the backporting scripts,
    change the somewhat low number of FDs to 65536, change a variable
    name as to not suggest this has anything to do with tor authority
    directory servers.

applied/debian/experimental 2019-07-28 10:27:04 UTC 2019-07-28
Import patches-applied version 0.4.1.4-rc-1 to applied/debian/experimental

Author: Peter Palfrader
Author Date: 2019-07-26 07:32:22 UTC

Import patches-applied version 0.4.1.4-rc-1 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: de2f8e3b1fdb3be959b7be8d28c697638b144454
Unapplied parent: c402fde5f3b92b8ce221fab27c50a3862f5ca13b

New changelog entries:
  * New upstream version.
  * Use start-stop-daemon in the init script instead of ps. Using
    ps would require us to depend on procps when all we want is to
    check if a process exists (closes: #932125).
  * Add untested/unsupported runit support (closes: #930113).
    Use the patch provided there, except also fix the backporting scripts,
    change the somewhat low number of FDs to 65536, change a variable
    name as to not suggest this has anything to do with tor authority
    directory servers.

importer/ubuntu/dsc 2019-07-17 10:02:24 UTC 2019-07-17
DSC file for 0.4.0.5-2

Author: Ubuntu Git Importer
Author Date: 2019-07-17 10:02:24 UTC

DSC file for 0.4.0.5-2

ubuntu/eoan-devel 2019-07-15 16:43:56 UTC 2019-07-15
Import patches-unapplied version 0.4.0.5-2 to debian/sid

Author: Peter Palfrader
Author Date: 2019-07-13 14:00:05 UTC

Import patches-unapplied version 0.4.0.5-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: fac348071c778c9f83a87106e1bcf8004703483b

New changelog entries:
  * Upload 0.4.0.x tree to unstable.

ubuntu/eoan 2019-07-15 16:43:56 UTC 2019-07-15
Import patches-unapplied version 0.4.0.5-2 to debian/sid

Author: Peter Palfrader
Author Date: 2019-07-13 14:00:05 UTC

Import patches-unapplied version 0.4.0.5-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: fac348071c778c9f83a87106e1bcf8004703483b

New changelog entries:
  * Upload 0.4.0.x tree to unstable.

ubuntu/devel 2019-07-15 16:43:56 UTC 2019-07-15
Import patches-unapplied version 0.4.0.5-2 to debian/sid

Author: Peter Palfrader
Author Date: 2019-07-13 14:00:05 UTC

Import patches-unapplied version 0.4.0.5-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: fac348071c778c9f83a87106e1bcf8004703483b

New changelog entries:
  * Upload 0.4.0.x tree to unstable.

applied/ubuntu/devel 2019-07-15 16:43:56 UTC 2019-07-15
Import patches-applied version 0.4.0.5-2 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2019-07-13 14:00:05 UTC

Import patches-applied version 0.4.0.5-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 39b1173ddfe59f6cf97b2168aecaa2404a492941
Unapplied parent: e4475d23b913c3bdd040359eeb331bd098a2f1ab

New changelog entries:
  * Upload 0.4.0.x tree to unstable.

applied/debian/sid 2019-07-15 16:43:56 UTC 2019-07-15
Import patches-applied version 0.4.0.5-2 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2019-07-13 14:00:05 UTC

Import patches-applied version 0.4.0.5-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 39b1173ddfe59f6cf97b2168aecaa2404a492941
Unapplied parent: e4475d23b913c3bdd040359eeb331bd098a2f1ab

New changelog entries:
  * Upload 0.4.0.x tree to unstable.

ubuntu/eoan-proposed 2019-07-15 16:43:56 UTC 2019-07-15
Import patches-unapplied version 0.4.0.5-2 to debian/sid

Author: Peter Palfrader
Author Date: 2019-07-13 14:00:05 UTC

Import patches-unapplied version 0.4.0.5-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: fac348071c778c9f83a87106e1bcf8004703483b

New changelog entries:
  * Upload 0.4.0.x tree to unstable.

debian/sid 2019-07-15 16:43:56 UTC 2019-07-15
Import patches-unapplied version 0.4.0.5-2 to debian/sid

Author: Peter Palfrader
Author Date: 2019-07-13 14:00:05 UTC

Import patches-unapplied version 0.4.0.5-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: fac348071c778c9f83a87106e1bcf8004703483b

New changelog entries:
  * Upload 0.4.0.x tree to unstable.

applied/ubuntu/eoan-proposed 2019-07-15 16:43:56 UTC 2019-07-15
Import patches-applied version 0.4.0.5-2 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2019-07-13 14:00:05 UTC

Import patches-applied version 0.4.0.5-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 39b1173ddfe59f6cf97b2168aecaa2404a492941
Unapplied parent: e4475d23b913c3bdd040359eeb331bd098a2f1ab

New changelog entries:
  * Upload 0.4.0.x tree to unstable.

applied/ubuntu/eoan-devel 2019-07-15 16:43:56 UTC 2019-07-15
Import patches-applied version 0.4.0.5-2 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2019-07-13 14:00:05 UTC

Import patches-applied version 0.4.0.5-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 39b1173ddfe59f6cf97b2168aecaa2404a492941
Unapplied parent: e4475d23b913c3bdd040359eeb331bd098a2f1ab

New changelog entries:
  * Upload 0.4.0.x tree to unstable.

applied/ubuntu/eoan 2019-07-15 16:43:56 UTC 2019-07-15
Import patches-applied version 0.4.0.5-2 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2019-07-13 14:00:05 UTC

Import patches-applied version 0.4.0.5-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 39b1173ddfe59f6cf97b2168aecaa2404a492941
Unapplied parent: e4475d23b913c3bdd040359eeb331bd098a2f1ab

New changelog entries:
  * Upload 0.4.0.x tree to unstable.

ubuntu/disco 2019-02-22 16:41:30 UTC 2019-02-22
Import patches-unapplied version 0.3.5.8-1 to debian/sid

Author: Peter Palfrader
Author Date: 2019-02-21 20:28:32 UTC

Import patches-unapplied version 0.3.5.8-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 79821a880d48c0992986779dc3086bf3ebd245ad

New changelog entries:
  * Replace all references to /var/run with /run (closes: #918898).
  * New upstream version.
    - Includes a fix for a medium-severity security bug:
      Make KIST consider the outbuf length when computing what it can
      put in the outbuf. Previously, KIST acted as though the outbuf
      were empty, which could lead to the outbuf becoming too full. It
      is possible that an attacker could exploit this bug to cause a Tor
      client or relay to run out of memory and crash. Fixes bug 29168;
      bugfix on 0.3.2.1-alpha. This issue is also being tracked as
      TROVE-2019-001 and CVE-2019-8955.

applied/debian/buster 2019-02-22 16:41:30 UTC 2019-02-22
Import patches-applied version 0.3.5.8-1 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2019-02-21 20:28:32 UTC

Import patches-applied version 0.3.5.8-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 5795ef770526c7df157424bd3a9c142ef99c7dbd
Unapplied parent: 9d563e74ff474c5183899b15a9769791c1309535

New changelog entries:
  * Replace all references to /var/run with /run (closes: #918898).
  * New upstream version.
    - Includes a fix for a medium-severity security bug:
      Make KIST consider the outbuf length when computing what it can
      put in the outbuf. Previously, KIST acted as though the outbuf
      were empty, which could lead to the outbuf becoming too full. It
      is possible that an attacker could exploit this bug to cause a Tor
      client or relay to run out of memory and crash. Fixes bug 29168;
      bugfix on 0.3.2.1-alpha. This issue is also being tracked as
      TROVE-2019-001 and CVE-2019-8955.

ubuntu/disco-devel 2019-02-22 16:41:30 UTC 2019-02-22
Import patches-unapplied version 0.3.5.8-1 to debian/sid

Author: Peter Palfrader
Author Date: 2019-02-21 20:28:32 UTC

Import patches-unapplied version 0.3.5.8-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 79821a880d48c0992986779dc3086bf3ebd245ad

New changelog entries:
  * Replace all references to /var/run with /run (closes: #918898).
  * New upstream version.
    - Includes a fix for a medium-severity security bug:
      Make KIST consider the outbuf length when computing what it can
      put in the outbuf. Previously, KIST acted as though the outbuf
      were empty, which could lead to the outbuf becoming too full. It
      is possible that an attacker could exploit this bug to cause a Tor
      client or relay to run out of memory and crash. Fixes bug 29168;
      bugfix on 0.3.2.1-alpha. This issue is also being tracked as
      TROVE-2019-001 and CVE-2019-8955.

applied/ubuntu/disco-proposed 2019-02-22 16:41:30 UTC 2019-02-22
Import patches-applied version 0.3.5.8-1 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2019-02-21 20:28:32 UTC

Import patches-applied version 0.3.5.8-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 5795ef770526c7df157424bd3a9c142ef99c7dbd
Unapplied parent: 9d563e74ff474c5183899b15a9769791c1309535

New changelog entries:
  * Replace all references to /var/run with /run (closes: #918898).
  * New upstream version.
    - Includes a fix for a medium-severity security bug:
      Make KIST consider the outbuf length when computing what it can
      put in the outbuf. Previously, KIST acted as though the outbuf
      were empty, which could lead to the outbuf becoming too full. It
      is possible that an attacker could exploit this bug to cause a Tor
      client or relay to run out of memory and crash. Fixes bug 29168;
      bugfix on 0.3.2.1-alpha. This issue is also being tracked as
      TROVE-2019-001 and CVE-2019-8955.

ubuntu/disco-proposed 2019-02-22 16:41:30 UTC 2019-02-22
Import patches-unapplied version 0.3.5.8-1 to debian/sid

Author: Peter Palfrader
Author Date: 2019-02-21 20:28:32 UTC

Import patches-unapplied version 0.3.5.8-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 79821a880d48c0992986779dc3086bf3ebd245ad

New changelog entries:
  * Replace all references to /var/run with /run (closes: #918898).
  * New upstream version.
    - Includes a fix for a medium-severity security bug:
      Make KIST consider the outbuf length when computing what it can
      put in the outbuf. Previously, KIST acted as though the outbuf
      were empty, which could lead to the outbuf becoming too full. It
      is possible that an attacker could exploit this bug to cause a Tor
      client or relay to run out of memory and crash. Fixes bug 29168;
      bugfix on 0.3.2.1-alpha. This issue is also being tracked as
      TROVE-2019-001 and CVE-2019-8955.

debian/buster 2019-02-22 16:41:30 UTC 2019-02-22
Import patches-unapplied version 0.3.5.8-1 to debian/sid

Author: Peter Palfrader
Author Date: 2019-02-21 20:28:32 UTC

Import patches-unapplied version 0.3.5.8-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 79821a880d48c0992986779dc3086bf3ebd245ad

New changelog entries:
  * Replace all references to /var/run with /run (closes: #918898).
  * New upstream version.
    - Includes a fix for a medium-severity security bug:
      Make KIST consider the outbuf length when computing what it can
      put in the outbuf. Previously, KIST acted as though the outbuf
      were empty, which could lead to the outbuf becoming too full. It
      is possible that an attacker could exploit this bug to cause a Tor
      client or relay to run out of memory and crash. Fixes bug 29168;
      bugfix on 0.3.2.1-alpha. This issue is also being tracked as
      TROVE-2019-001 and CVE-2019-8955.

applied/ubuntu/disco 2019-02-22 16:41:30 UTC 2019-02-22
Import patches-applied version 0.3.5.8-1 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2019-02-21 20:28:32 UTC

Import patches-applied version 0.3.5.8-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 5795ef770526c7df157424bd3a9c142ef99c7dbd
Unapplied parent: 9d563e74ff474c5183899b15a9769791c1309535

New changelog entries:
  * Replace all references to /var/run with /run (closes: #918898).
  * New upstream version.
    - Includes a fix for a medium-severity security bug:
      Make KIST consider the outbuf length when computing what it can
      put in the outbuf. Previously, KIST acted as though the outbuf
      were empty, which could lead to the outbuf becoming too full. It
      is possible that an attacker could exploit this bug to cause a Tor
      client or relay to run out of memory and crash. Fixes bug 29168;
      bugfix on 0.3.2.1-alpha. This issue is also being tracked as
      TROVE-2019-001 and CVE-2019-8955.

applied/ubuntu/disco-devel 2019-02-22 16:41:30 UTC 2019-02-22
Import patches-applied version 0.3.5.8-1 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2019-02-21 20:28:32 UTC

Import patches-applied version 0.3.5.8-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 5795ef770526c7df157424bd3a9c142ef99c7dbd
Unapplied parent: 9d563e74ff474c5183899b15a9769791c1309535

New changelog entries:
  * Replace all references to /var/run with /run (closes: #918898).
  * New upstream version.
    - Includes a fix for a medium-severity security bug:
      Make KIST consider the outbuf length when computing what it can
      put in the outbuf. Previously, KIST acted as though the outbuf
      were empty, which could lead to the outbuf becoming too full. It
      is possible that an attacker could exploit this bug to cause a Tor
      client or relay to run out of memory and crash. Fixes bug 29168;
      bugfix on 0.3.2.1-alpha. This issue is also being tracked as
      TROVE-2019-001 and CVE-2019-8955.

ubuntu/trusty-updates 2018-11-26 17:28:26 UTC 2018-11-26
Import patches-unapplied version 0.2.4.27-1ubuntu0.1 to ubuntu/trusty-security

Author: Eduardo dos Santos Barretto
Author Date: 2018-11-23 16:25:06 UTC

Import patches-unapplied version 0.2.4.27-1ubuntu0.1 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: ad608796bf2aedb2d8f07231a9e166d17f793ae8

New changelog entries:
  * SECURITY UPDATE: DoS (client crash) via a crafted hidden service
    descriptor.
    - debian/patches/CVE-2016-1254.patch: Fix parsing bug with unrecognized
      token at EOS.
    - CVE-2016-1254
  * SECURITY UPDATE: DoS (crash) via crafted data.
    - debian/patches/CVE-2016-8860.patch: Protect against NUL-terminated
      inputs.
    - CVE-2016-8860
  * SECURITY UPDATE: DoS (assertion failure and daemon exit) via a BEGIN_DIR
    rendezvous circuit.
    - debian/patches/CVE-2017-0376.patch: Fix assertion failure.
    - CVE-2017-0376
  * SECURITY UPDATE: Replay-cache protection mechanism is ineffective for v2
    onion services.
    - debian/patches/CVE-2017-8819.patch: Fix length of replaycache-checked
      data.
    - CVE-2017-8819
  * SECURITY UPDATE: DoS (application hang) via a crafted PEM input.
    - debian/patches/CVE-2017-8821.patch: Avoid asking for passphrase on
      junky PEM input.
    - CVE-2017-8821
  * SECURITY UPDATE: Relays, that have incompletely downloaded
    descriptors, can pick themselves in a circuit path, leading to a
    degradation of anonymity
    - debian/patches/CVE-2017-8822.patch: Use local descriptor object to
      exclude self in path selection.
    - CVE-2017-8822

applied/ubuntu/trusty-updates 2018-11-26 17:28:26 UTC 2018-11-26
Import patches-applied version 0.2.4.27-1ubuntu0.1 to applied/ubuntu/trusty-s...

Author: Eduardo dos Santos Barretto
Author Date: 2018-11-23 16:25:06 UTC

Import patches-applied version 0.2.4.27-1ubuntu0.1 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e01618989f883d375006c90dac844bf20430c2b1
Unapplied parent: 404090b3fbb20d820f3ef9d3518828db6c3c7628

New changelog entries:
  * SECURITY UPDATE: DoS (client crash) via a crafted hidden service
    descriptor.
    - debian/patches/CVE-2016-1254.patch: Fix parsing bug with unrecognized
      token at EOS.
    - CVE-2016-1254
  * SECURITY UPDATE: DoS (crash) via crafted data.
    - debian/patches/CVE-2016-8860.patch: Protect against NUL-terminated
      inputs.
    - CVE-2016-8860
  * SECURITY UPDATE: DoS (assertion failure and daemon exit) via a BEGIN_DIR
    rendezvous circuit.
    - debian/patches/CVE-2017-0376.patch: Fix assertion failure.
    - CVE-2017-0376
  * SECURITY UPDATE: Replay-cache protection mechanism is ineffective for v2
    onion services.
    - debian/patches/CVE-2017-8819.patch: Fix length of replaycache-checked
      data.
    - CVE-2017-8819
  * SECURITY UPDATE: DoS (application hang) via a crafted PEM input.
    - debian/patches/CVE-2017-8821.patch: Avoid asking for passphrase on
      junky PEM input.
    - CVE-2017-8821
  * SECURITY UPDATE: Relays, that have incompletely downloaded
    descriptors, can pick themselves in a circuit path, leading to a
    degradation of anonymity
    - debian/patches/CVE-2017-8822.patch: Use local descriptor object to
      exclude self in path selection.
    - CVE-2017-8822

applied/ubuntu/trusty-security 2018-11-26 17:28:26 UTC 2018-11-26
Import patches-applied version 0.2.4.27-1ubuntu0.1 to applied/ubuntu/trusty-s...

Author: Eduardo dos Santos Barretto
Author Date: 2018-11-23 16:25:06 UTC

Import patches-applied version 0.2.4.27-1ubuntu0.1 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e01618989f883d375006c90dac844bf20430c2b1
Unapplied parent: 404090b3fbb20d820f3ef9d3518828db6c3c7628

New changelog entries:
  * SECURITY UPDATE: DoS (client crash) via a crafted hidden service
    descriptor.
    - debian/patches/CVE-2016-1254.patch: Fix parsing bug with unrecognized
      token at EOS.
    - CVE-2016-1254
  * SECURITY UPDATE: DoS (crash) via crafted data.
    - debian/patches/CVE-2016-8860.patch: Protect against NUL-terminated
      inputs.
    - CVE-2016-8860
  * SECURITY UPDATE: DoS (assertion failure and daemon exit) via a BEGIN_DIR
    rendezvous circuit.
    - debian/patches/CVE-2017-0376.patch: Fix assertion failure.
    - CVE-2017-0376
  * SECURITY UPDATE: Replay-cache protection mechanism is ineffective for v2
    onion services.
    - debian/patches/CVE-2017-8819.patch: Fix length of replaycache-checked
      data.
    - CVE-2017-8819
  * SECURITY UPDATE: DoS (application hang) via a crafted PEM input.
    - debian/patches/CVE-2017-8821.patch: Avoid asking for passphrase on
      junky PEM input.
    - CVE-2017-8821
  * SECURITY UPDATE: Relays, that have incompletely downloaded
    descriptors, can pick themselves in a circuit path, leading to a
    degradation of anonymity
    - debian/patches/CVE-2017-8822.patch: Use local descriptor object to
      exclude self in path selection.
    - CVE-2017-8822

applied/ubuntu/trusty-devel 2018-11-26 17:28:26 UTC 2018-11-26
Import patches-applied version 0.2.4.27-1ubuntu0.1 to applied/ubuntu/trusty-s...

Author: Eduardo dos Santos Barretto
Author Date: 2018-11-23 16:25:06 UTC

Import patches-applied version 0.2.4.27-1ubuntu0.1 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e01618989f883d375006c90dac844bf20430c2b1
Unapplied parent: 404090b3fbb20d820f3ef9d3518828db6c3c7628

New changelog entries:
  * SECURITY UPDATE: DoS (client crash) via a crafted hidden service
    descriptor.
    - debian/patches/CVE-2016-1254.patch: Fix parsing bug with unrecognized
      token at EOS.
    - CVE-2016-1254
  * SECURITY UPDATE: DoS (crash) via crafted data.
    - debian/patches/CVE-2016-8860.patch: Protect against NUL-terminated
      inputs.
    - CVE-2016-8860
  * SECURITY UPDATE: DoS (assertion failure and daemon exit) via a BEGIN_DIR
    rendezvous circuit.
    - debian/patches/CVE-2017-0376.patch: Fix assertion failure.
    - CVE-2017-0376
  * SECURITY UPDATE: Replay-cache protection mechanism is ineffective for v2
    onion services.
    - debian/patches/CVE-2017-8819.patch: Fix length of replaycache-checked
      data.
    - CVE-2017-8819
  * SECURITY UPDATE: DoS (application hang) via a crafted PEM input.
    - debian/patches/CVE-2017-8821.patch: Avoid asking for passphrase on
      junky PEM input.
    - CVE-2017-8821
  * SECURITY UPDATE: Relays, that have incompletely downloaded
    descriptors, can pick themselves in a circuit path, leading to a
    degradation of anonymity
    - debian/patches/CVE-2017-8822.patch: Use local descriptor object to
      exclude self in path selection.
    - CVE-2017-8822

ubuntu/trusty-devel 2018-11-26 17:28:26 UTC 2018-11-26
Import patches-unapplied version 0.2.4.27-1ubuntu0.1 to ubuntu/trusty-security

Author: Eduardo dos Santos Barretto
Author Date: 2018-11-23 16:25:06 UTC

Import patches-unapplied version 0.2.4.27-1ubuntu0.1 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: ad608796bf2aedb2d8f07231a9e166d17f793ae8

New changelog entries:
  * SECURITY UPDATE: DoS (client crash) via a crafted hidden service
    descriptor.
    - debian/patches/CVE-2016-1254.patch: Fix parsing bug with unrecognized
      token at EOS.
    - CVE-2016-1254
  * SECURITY UPDATE: DoS (crash) via crafted data.
    - debian/patches/CVE-2016-8860.patch: Protect against NUL-terminated
      inputs.
    - CVE-2016-8860
  * SECURITY UPDATE: DoS (assertion failure and daemon exit) via a BEGIN_DIR
    rendezvous circuit.
    - debian/patches/CVE-2017-0376.patch: Fix assertion failure.
    - CVE-2017-0376
  * SECURITY UPDATE: Replay-cache protection mechanism is ineffective for v2
    onion services.
    - debian/patches/CVE-2017-8819.patch: Fix length of replaycache-checked
      data.
    - CVE-2017-8819
  * SECURITY UPDATE: DoS (application hang) via a crafted PEM input.
    - debian/patches/CVE-2017-8821.patch: Avoid asking for passphrase on
      junky PEM input.
    - CVE-2017-8821
  * SECURITY UPDATE: Relays, that have incompletely downloaded
    descriptors, can pick themselves in a circuit path, leading to a
    degradation of anonymity
    - debian/patches/CVE-2017-8822.patch: Use local descriptor object to
      exclude self in path selection.
    - CVE-2017-8822

ubuntu/trusty-security 2018-11-26 17:28:26 UTC 2018-11-26
Import patches-unapplied version 0.2.4.27-1ubuntu0.1 to ubuntu/trusty-security

Author: Eduardo dos Santos Barretto
Author Date: 2018-11-23 16:25:06 UTC

Import patches-unapplied version 0.2.4.27-1ubuntu0.1 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: ad608796bf2aedb2d8f07231a9e166d17f793ae8

New changelog entries:
  * SECURITY UPDATE: DoS (client crash) via a crafted hidden service
    descriptor.
    - debian/patches/CVE-2016-1254.patch: Fix parsing bug with unrecognized
      token at EOS.
    - CVE-2016-1254
  * SECURITY UPDATE: DoS (crash) via crafted data.
    - debian/patches/CVE-2016-8860.patch: Protect against NUL-terminated
      inputs.
    - CVE-2016-8860
  * SECURITY UPDATE: DoS (assertion failure and daemon exit) via a BEGIN_DIR
    rendezvous circuit.
    - debian/patches/CVE-2017-0376.patch: Fix assertion failure.
    - CVE-2017-0376
  * SECURITY UPDATE: Replay-cache protection mechanism is ineffective for v2
    onion services.
    - debian/patches/CVE-2017-8819.patch: Fix length of replaycache-checked
      data.
    - CVE-2017-8819
  * SECURITY UPDATE: DoS (application hang) via a crafted PEM input.
    - debian/patches/CVE-2017-8821.patch: Avoid asking for passphrase on
      junky PEM input.
    - CVE-2017-8821
  * SECURITY UPDATE: Relays, that have incompletely downloaded
    descriptors, can pick themselves in a circuit path, leading to a
    degradation of anonymity
    - debian/patches/CVE-2017-8822.patch: Use local descriptor object to
      exclude self in path selection.
    - CVE-2017-8822

ubuntu/xenial-updates 2018-11-22 19:43:12 UTC 2018-11-22
Import patches-unapplied version 0.2.9.14-1ubuntu1~16.04.3 to ubuntu/xenial-s...

Author: Eduardo dos Santos Barretto
Author Date: 2018-11-22 15:37:42 UTC

Import patches-unapplied version 0.2.9.14-1ubuntu1~16.04.3 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: f19c374cc310f87607cea21e133cf0a9794853fd

New changelog entries:
  * SECURITY UPDATE: Remote crash attack against directory authorities.
    - debian/patches/CVE-2018-0490.patch: Correctly handle NULL returns
      from parse_protocol_list when voting.
    - CVE-2018-0490

ubuntu/xenial-devel 2018-11-22 19:43:12 UTC 2018-11-22
Import patches-unapplied version 0.2.9.14-1ubuntu1~16.04.3 to ubuntu/xenial-s...

Author: Eduardo dos Santos Barretto
Author Date: 2018-11-22 15:37:42 UTC

Import patches-unapplied version 0.2.9.14-1ubuntu1~16.04.3 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: f19c374cc310f87607cea21e133cf0a9794853fd

New changelog entries:
  * SECURITY UPDATE: Remote crash attack against directory authorities.
    - debian/patches/CVE-2018-0490.patch: Correctly handle NULL returns
      from parse_protocol_list when voting.
    - CVE-2018-0490

applied/ubuntu/xenial-devel 2018-11-22 19:43:12 UTC 2018-11-22
Import patches-applied version 0.2.9.14-1ubuntu1~16.04.3 to applied/ubuntu/xe...

Author: Eduardo dos Santos Barretto
Author Date: 2018-11-22 15:37:42 UTC

Import patches-applied version 0.2.9.14-1ubuntu1~16.04.3 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 1af6bcf0c620d834ac6cb3a0ae003228add108ae
Unapplied parent: 4fdedc705c37dae48fb25b26429555922cc28003

New changelog entries:
  * SECURITY UPDATE: Remote crash attack against directory authorities.
    - debian/patches/CVE-2018-0490.patch: Correctly handle NULL returns
      from parse_protocol_list when voting.
    - CVE-2018-0490

applied/ubuntu/xenial-security 2018-11-22 19:43:12 UTC 2018-11-22
Import patches-applied version 0.2.9.14-1ubuntu1~16.04.3 to applied/ubuntu/xe...

Author: Eduardo dos Santos Barretto
Author Date: 2018-11-22 15:37:42 UTC

Import patches-applied version 0.2.9.14-1ubuntu1~16.04.3 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 1af6bcf0c620d834ac6cb3a0ae003228add108ae
Unapplied parent: 4fdedc705c37dae48fb25b26429555922cc28003

New changelog entries:
  * SECURITY UPDATE: Remote crash attack against directory authorities.
    - debian/patches/CVE-2018-0490.patch: Correctly handle NULL returns
      from parse_protocol_list when voting.
    - CVE-2018-0490

applied/ubuntu/xenial-updates 2018-11-22 19:43:12 UTC 2018-11-22
Import patches-applied version 0.2.9.14-1ubuntu1~16.04.3 to applied/ubuntu/xe...

Author: Eduardo dos Santos Barretto
Author Date: 2018-11-22 15:37:42 UTC

Import patches-applied version 0.2.9.14-1ubuntu1~16.04.3 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 1af6bcf0c620d834ac6cb3a0ae003228add108ae
Unapplied parent: 4fdedc705c37dae48fb25b26429555922cc28003

New changelog entries:
  * SECURITY UPDATE: Remote crash attack against directory authorities.
    - debian/patches/CVE-2018-0490.patch: Correctly handle NULL returns
      from parse_protocol_list when voting.
    - CVE-2018-0490

ubuntu/xenial-security 2018-11-22 19:43:12 UTC 2018-11-22
Import patches-unapplied version 0.2.9.14-1ubuntu1~16.04.3 to ubuntu/xenial-s...

Author: Eduardo dos Santos Barretto
Author Date: 2018-11-22 15:37:42 UTC

Import patches-unapplied version 0.2.9.14-1ubuntu1~16.04.3 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: f19c374cc310f87607cea21e133cf0a9794853fd

New changelog entries:
  * SECURITY UPDATE: Remote crash attack against directory authorities.
    - debian/patches/CVE-2018-0490.patch: Correctly handle NULL returns
      from parse_protocol_list when voting.
    - CVE-2018-0490

debian/stretch 2018-11-10 17:18:37 UTC 2018-11-10
Import patches-unapplied version 0.2.9.16-1 to debian/stretch

Author: Peter Palfrader
Author Date: 2018-07-18 10:36:25 UTC

Import patches-unapplied version 0.2.9.16-1 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: db20829623abc1d450088e4f24aa67d2b8586fe5

New changelog entries:
  * New upstream version, upload to stable (re: #903786).
    - Directory authority changes.

applied/debian/stretch 2018-11-10 17:18:37 UTC 2018-11-10
Import patches-applied version 0.2.9.16-1 to applied/debian/stretch

Author: Peter Palfrader
Author Date: 2018-07-18 10:36:25 UTC

Import patches-applied version 0.2.9.16-1 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: 6ddd350596b8cd021c25f850601ad8b40cbf4f6d
Unapplied parent: 8ea6a8ea21507c5f039283f8ac309bfb6936acf5

New changelog entries:
  * New upstream version, upload to stable (re: #903786).
    - Directory authority changes.

applied/ubuntu/cosmic 2018-07-14 04:38:36 UTC 2018-07-14
Import patches-applied version 0.3.3.9-1 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2018-07-13 20:24:19 UTC

Import patches-applied version 0.3.3.9-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 5cba5bd7a68e0ecf41f20f618a259e248842a5d2
Unapplied parent: 33e705280962843e77c1593d2db15e5e21a44368

New changelog entries:
  * New upstream version.

applied/ubuntu/cosmic-proposed 2018-07-14 04:38:36 UTC 2018-07-14
Import patches-applied version 0.3.3.9-1 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2018-07-13 20:24:19 UTC

Import patches-applied version 0.3.3.9-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 5cba5bd7a68e0ecf41f20f618a259e248842a5d2
Unapplied parent: 33e705280962843e77c1593d2db15e5e21a44368

New changelog entries:
  * New upstream version.

ubuntu/cosmic-proposed 2018-07-14 04:38:36 UTC 2018-07-14
Import patches-unapplied version 0.3.3.9-1 to debian/sid

Author: Peter Palfrader
Author Date: 2018-07-13 20:24:19 UTC

Import patches-unapplied version 0.3.3.9-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: a2662f865448c89cf86770949065acd4fa00625f

New changelog entries:
  * New upstream version.

ubuntu/cosmic 2018-07-14 04:38:36 UTC 2018-07-14
Import patches-unapplied version 0.3.3.9-1 to debian/sid

Author: Peter Palfrader
Author Date: 2018-07-13 20:24:19 UTC

Import patches-unapplied version 0.3.3.9-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: a2662f865448c89cf86770949065acd4fa00625f

New changelog entries:
  * New upstream version.

ubuntu/cosmic-devel 2018-07-14 04:38:36 UTC 2018-07-14
Import patches-unapplied version 0.3.3.9-1 to debian/sid

Author: Peter Palfrader
Author Date: 2018-07-13 20:24:19 UTC

Import patches-unapplied version 0.3.3.9-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: a2662f865448c89cf86770949065acd4fa00625f

New changelog entries:
  * New upstream version.

applied/ubuntu/cosmic-devel 2018-07-14 04:38:36 UTC 2018-07-14
Import patches-applied version 0.3.3.9-1 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2018-07-13 20:24:19 UTC

Import patches-applied version 0.3.3.9-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 5cba5bd7a68e0ecf41f20f618a259e248842a5d2
Unapplied parent: 33e705280962843e77c1593d2db15e5e21a44368

New changelog entries:
  * New upstream version.

debian/jessie 2018-06-23 17:31:02 UTC 2018-06-23
Import patches-unapplied version 0.2.5.16-1 to debian/jessie

Author: Peter Palfrader
Author Date: 2017-12-02 15:16:35 UTC

Import patches-unapplied version 0.2.5.16-1 to debian/jessie

Imported using git-ubuntu import.

Changelog parent: c6fbb4dbf0c3cc4963de87905dd7722a350a5159

New changelog entries:
  * New upstream version, including among others:
    - Fix a denial of service bug where an attacker could use a
      malformed directory object to cause a Tor instance to pause while
      OpenSSL would try to read a passphrase from the terminal. (Tor
      instances run without a terminal, which is the case for most Tor
      packages, are not impacted.) Fixes bug 24246; bugfix on every
      version of Tor. Also tracked as TROVE-2017-011 and CVE-2017-8821.
      Found by OSS-Fuzz as testcase 6360145429790720.
    - When checking for replays in the INTRODUCE1 cell data for a
      (legacy) onion service, correctly detect replays in the RSA-
      encrypted part of the cell. We were previously checking for
      replays on the entire cell, but those can be circumvented due to
      the malleability of Tor's legacy hybrid encryption. This fix helps
      prevent a traffic confirmation attack. Fixes bug 24244; bugfix on
      0.2.4.1-alpha. This issue is also tracked as TROVE-2017-009
      and CVE-2017-8819.
    - When running as a relay, make sure that we never build a path
      through ourselves, even in the case where we have somehow lost the
      version of our descriptor appearing in the consensus. Fixes part
      of bug 21534; bugfix on 0.2.0.1-alpha. This issue is also tracked
      as TROVE-2017-012 and CVE-2017-8822.

applied/debian/jessie 2018-06-23 17:31:02 UTC 2018-06-23
Import patches-applied version 0.2.5.16-1 to applied/debian/jessie

Author: Peter Palfrader
Author Date: 2017-12-02 15:16:35 UTC

Import patches-applied version 0.2.5.16-1 to applied/debian/jessie

Imported using git-ubuntu import.

Changelog parent: 24853856e8d41526e3ef1fbe1931b64e0f14fed2
Unapplied parent: f2121464c71882756af9f31d219a98ebc137de8d

New changelog entries:
  * New upstream version, including among others:
    - Fix a denial of service bug where an attacker could use a
      malformed directory object to cause a Tor instance to pause while
      OpenSSL would try to read a passphrase from the terminal. (Tor
      instances run without a terminal, which is the case for most Tor
      packages, are not impacted.) Fixes bug 24246; bugfix on every
      version of Tor. Also tracked as TROVE-2017-011 and CVE-2017-8821.
      Found by OSS-Fuzz as testcase 6360145429790720.
    - When checking for replays in the INTRODUCE1 cell data for a
      (legacy) onion service, correctly detect replays in the RSA-
      encrypted part of the cell. We were previously checking for
      replays on the entire cell, but those can be circumvented due to
      the malleability of Tor's legacy hybrid encryption. This fix helps
      prevent a traffic confirmation attack. Fixes bug 24244; bugfix on
      0.2.4.1-alpha. This issue is also tracked as TROVE-2017-009
      and CVE-2017-8819.
    - When running as a relay, make sure that we never build a path
      through ourselves, even in the case where we have somehow lost the
      version of our descriptor appearing in the consensus. Fixes part
      of bug 21534; bugfix on 0.2.0.1-alpha. This issue is also tracked
      as TROVE-2017-012 and CVE-2017-8822.

importer/debian/pristine-tar 2018-04-06 01:03:25 UTC 2018-04-06
pristine-tar data for tor_0.3.3.4-alpha.orig.tar.gz

Author: Ubuntu Git Importer
Author Date: 2018-04-06 01:03:25 UTC

pristine-tar data for tor_0.3.3.4-alpha.orig.tar.gz

importer/ubuntu/pristine-tar 2018-03-20 19:03:41 UTC 2018-03-20
pristine-tar data for tor_0.3.2.10.orig.tar.gz

Author: Ubuntu Git Importer
Author Date: 2018-03-20 19:03:41 UTC

pristine-tar data for tor_0.3.2.10.orig.tar.gz

applied/ubuntu/bionic-devel 2018-03-05 16:44:35 UTC 2018-03-05
Import patches-applied version 0.3.2.10-1 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2018-03-03 13:37:34 UTC

Import patches-applied version 0.3.2.10-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 84d0a2ee09d3066f90ab8b0b3b2c3f1eb2c1463e
Unapplied parent: a03c2ef5ad3eae3a70ddd559ef925223be0b59a0

New changelog entries:
  * New upstream version.
    - Includes an important security fix for a remote crash attack against
      directory authorities.
      [TROVE-2018-001 and CVE-2018-0490]
    - Additionally, backports a fix for Tor#24700, which was originally
      fixed in 0.3.3.2-alpha but had its severity upgraded now as it can be
      remotely triggered and can crash relays.
      [TROVE-2018-002 and CVE-2018-0491]

applied/ubuntu/bionic-proposed 2018-03-05 16:44:35 UTC 2018-03-05
Import patches-applied version 0.3.2.10-1 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2018-03-03 13:37:34 UTC

Import patches-applied version 0.3.2.10-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 84d0a2ee09d3066f90ab8b0b3b2c3f1eb2c1463e
Unapplied parent: a03c2ef5ad3eae3a70ddd559ef925223be0b59a0

New changelog entries:
  * New upstream version.
    - Includes an important security fix for a remote crash attack against
      directory authorities.
      [TROVE-2018-001 and CVE-2018-0490]
    - Additionally, backports a fix for Tor#24700, which was originally
      fixed in 0.3.3.2-alpha but had its severity upgraded now as it can be
      remotely triggered and can crash relays.
      [TROVE-2018-002 and CVE-2018-0491]

ubuntu/bionic 2018-03-05 16:44:35 UTC 2018-03-05
Import patches-unapplied version 0.3.2.10-1 to debian/sid

Author: Peter Palfrader
Author Date: 2018-03-03 13:37:34 UTC

Import patches-unapplied version 0.3.2.10-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: ef7749612d8310201de025ef5bd12807ebaef3ea

New changelog entries:
  * New upstream version.
    - Includes an important security fix for a remote crash attack against
      directory authorities.
      [TROVE-2018-001 and CVE-2018-0490]
    - Additionally, backports a fix for Tor#24700, which was originally
      fixed in 0.3.3.2-alpha but had its severity upgraded now as it can be
      remotely triggered and can crash relays.
      [TROVE-2018-002 and CVE-2018-0491]

ubuntu/bionic-proposed 2018-03-05 16:44:35 UTC 2018-03-05
Import patches-unapplied version 0.3.2.10-1 to debian/sid

Author: Peter Palfrader
Author Date: 2018-03-03 13:37:34 UTC

Import patches-unapplied version 0.3.2.10-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: ef7749612d8310201de025ef5bd12807ebaef3ea

New changelog entries:
  * New upstream version.
    - Includes an important security fix for a remote crash attack against
      directory authorities.
      [TROVE-2018-001 and CVE-2018-0490]
    - Additionally, backports a fix for Tor#24700, which was originally
      fixed in 0.3.3.2-alpha but had its severity upgraded now as it can be
      remotely triggered and can crash relays.
      [TROVE-2018-002 and CVE-2018-0491]

ubuntu/bionic-devel 2018-03-05 16:44:35 UTC 2018-03-05
Import patches-unapplied version 0.3.2.10-1 to debian/sid

Author: Peter Palfrader
Author Date: 2018-03-03 13:37:34 UTC

Import patches-unapplied version 0.3.2.10-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: ef7749612d8310201de025ef5bd12807ebaef3ea

New changelog entries:
  * New upstream version.
    - Includes an important security fix for a remote crash attack against
      directory authorities.
      [TROVE-2018-001 and CVE-2018-0490]
    - Additionally, backports a fix for Tor#24700, which was originally
      fixed in 0.3.3.2-alpha but had its severity upgraded now as it can be
      remotely triggered and can crash relays.
      [TROVE-2018-002 and CVE-2018-0491]

applied/ubuntu/bionic 2018-03-05 16:44:35 UTC 2018-03-05
Import patches-applied version 0.3.2.10-1 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2018-03-03 13:37:34 UTC

Import patches-applied version 0.3.2.10-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 84d0a2ee09d3066f90ab8b0b3b2c3f1eb2c1463e
Unapplied parent: a03c2ef5ad3eae3a70ddd559ef925223be0b59a0

New changelog entries:
  * New upstream version.
    - Includes an important security fix for a remote crash attack against
      directory authorities.
      [TROVE-2018-001 and CVE-2018-0490]
    - Additionally, backports a fix for Tor#24700, which was originally
      fixed in 0.3.3.2-alpha but had its severity upgraded now as it can be
      remotely triggered and can crash relays.
      [TROVE-2018-002 and CVE-2018-0491]

applied/ubuntu/artful-security 2018-03-01 01:53:32 UTC 2018-03-01
Import patches-applied version 0.3.0.13-0ubuntu1~17.10.2 to applied/ubuntu/ar...

Author: Seth Arnold
Author Date: 2018-02-28 22:53:07 UTC

Import patches-applied version 0.3.0.13-0ubuntu1~17.10.2 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 912b2988833e1d322bc9859ea842dce386dca545
Unapplied parent: 57c3dcbb33e36f41ce3260b7783861cda7bc17ef

New changelog entries:
  * No change rebuild for the security pocket.

ubuntu/artful-updates 2018-03-01 01:53:32 UTC 2018-03-01
Import patches-unapplied version 0.3.0.13-0ubuntu1~17.10.2 to ubuntu/artful-s...

Author: Seth Arnold
Author Date: 2018-02-28 22:53:07 UTC

Import patches-unapplied version 0.3.0.13-0ubuntu1~17.10.2 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 5ce8468a110ebf331ebeb4809c87c9359daaebd9

New changelog entries:
  * No change rebuild for the security pocket.

ubuntu/artful-security 2018-03-01 01:53:32 UTC 2018-03-01
Import patches-unapplied version 0.3.0.13-0ubuntu1~17.10.2 to ubuntu/artful-s...

Author: Seth Arnold
Author Date: 2018-02-28 22:53:07 UTC

Import patches-unapplied version 0.3.0.13-0ubuntu1~17.10.2 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 5ce8468a110ebf331ebeb4809c87c9359daaebd9

New changelog entries:
  * No change rebuild for the security pocket.

ubuntu/artful-devel 2018-03-01 01:53:32 UTC 2018-03-01
Import patches-unapplied version 0.3.0.13-0ubuntu1~17.10.2 to ubuntu/artful-s...

Author: Seth Arnold
Author Date: 2018-02-28 22:53:07 UTC

Import patches-unapplied version 0.3.0.13-0ubuntu1~17.10.2 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 5ce8468a110ebf331ebeb4809c87c9359daaebd9

New changelog entries:
  * No change rebuild for the security pocket.

applied/ubuntu/artful-updates 2018-03-01 01:53:32 UTC 2018-03-01
Import patches-applied version 0.3.0.13-0ubuntu1~17.10.2 to applied/ubuntu/ar...

Author: Seth Arnold
Author Date: 2018-02-28 22:53:07 UTC

Import patches-applied version 0.3.0.13-0ubuntu1~17.10.2 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 912b2988833e1d322bc9859ea842dce386dca545
Unapplied parent: 57c3dcbb33e36f41ce3260b7783861cda7bc17ef

New changelog entries:
  * No change rebuild for the security pocket.

applied/ubuntu/artful-devel 2018-03-01 01:53:32 UTC 2018-03-01
Import patches-applied version 0.3.0.13-0ubuntu1~17.10.2 to applied/ubuntu/ar...

Author: Seth Arnold
Author Date: 2018-02-28 22:53:07 UTC

Import patches-applied version 0.3.0.13-0ubuntu1~17.10.2 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 912b2988833e1d322bc9859ea842dce386dca545
Unapplied parent: 57c3dcbb33e36f41ce3260b7783861cda7bc17ef

New changelog entries:
  * No change rebuild for the security pocket.

applied/ubuntu/artful-proposed 2018-02-14 00:13:45 UTC 2018-02-14
Import patches-applied version 0.3.0.13-0ubuntu1~17.10.1 to applied/ubuntu/ar...

Author: Simon Déziel
Author Date: 2018-01-14 19:15:21 UTC

Import patches-applied version 0.3.0.13-0ubuntu1~17.10.1 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: a9a781cf5af461c118ce95b91b9901c4c27f3f37
Unapplied parent: 5ce8468a110ebf331ebeb4809c87c9359daaebd9

New changelog entries:
  [ Peter Palfrader ]
  * Change "AppArmorProfile=system_tor" to AppArmorProfile=-system_tor,
    causing all errors while switching to the new apparmor profile to
    be ignored. This is not ideal, but for now it's probably the
    best solution. Thanks to intrigeri; closes: #880490.
  [ Simon Deziel ]
  * New upstream version: 0.3.0.13 (LP: #1731698)
    - Fix a denial of service bug where an attacker could use a
      malformed directory object to cause a Tor instance to pause while
      OpenSSL would try to read a passphrase from the terminal. (Tor
      instances run without a terminal, which is the case for most Tor
      packages, are not impacted.) Fixes bug 24246; bugfix on every
      version of Tor. Also tracked as TROVE-2017-011 and CVE-2017-8821.
      Found by OSS-Fuzz as testcase 6360145429790720.
    - Fix a denial of service issue where an attacker could crash a
      directory authority using a malformed router descriptor. Fixes bug
      24245; bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2017-010
      and CVE-2017-8820.
    - When checking for replays in the INTRODUCE1 cell data for a
      (legacy) onion service, correctly detect replays in the RSA-
      encrypted part of the cell. We were previously checking for
      replays on the entire cell, but those can be circumvented due to
      the malleability of Tor's legacy hybrid encryption. This fix helps
      prevent a traffic confirmation attack. Fixes bug 24244; bugfix on
      0.2.4.1-alpha. This issue is also tracked as TROVE-2017-009
      and CVE-2017-8819.
    - Fix a use-after-free error that could crash v2 Tor onion services
      when they failed to open circuits while expiring introduction
      points. Fixes bug 24313; bugfix on 0.2.7.2-alpha. This issue is
      also tracked as TROVE-2017-013 and CVE-2017-8823.
    - When running as a relay, make sure that we never build a path
      through ourselves, even in the case where we have somehow lost the
      version of our descriptor appearing in the consensus. Fixes part
      of bug 21534; bugfix on 0.2.0.1-alpha. This issue is also tracked
      as TROVE-2017-012 and CVE-2017-8822.
    - When running as a relay, make sure that we never choose ourselves
      as a guard. Fixes part of bug 21534; bugfix on 0.3.0.1-alpha. This
      issue is also tracked as TROVE-2017-012 and CVE-2017-8822.
  * New upstream version: 0.3.0.12
    - Directory authority changes
  * New upstream version: 0.3.0.11
    - Fix TROVE-2017-008: Stack disclosure in hidden services logs when
      SafeLogging disabled (CVE-2017-0380)
  * debian/rules: stop overriding micro-revision.i
  * apparmor: use Pix instead of PUx for obfs4proxy, giving us
    better confinement of the child process while actually working
    with systemd's NoNewPrivileges. (closes: #867342)
  * Drop versioned dependency on binutils. The version is already
    newer in all supported Debian and Ubuntu trees, and binutils
    is in the transitive dependency set of build-essential.
    Patch by Helmut Grohne. (closes: #873127)
  * Do not rely on aa-exec and aa-enabled being in /usr/sbin in the
    SysV init script. This change enables apparmor confinement
    on some system-V systems again. (closes: #869153)

ubuntu/artful-proposed 2018-02-14 00:13:45 UTC 2018-02-14
Import patches-unapplied version 0.3.0.13-0ubuntu1~17.10.1 to ubuntu/artful-p...

Author: Simon Déziel
Author Date: 2018-01-14 19:15:21 UTC

Import patches-unapplied version 0.3.0.13-0ubuntu1~17.10.1 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 2c882b3dabfc15b3d3e942deb063095dfd470724

New changelog entries:
  [ Peter Palfrader ]
  * Change "AppArmorProfile=system_tor" to AppArmorProfile=-system_tor,
    causing all errors while switching to the new apparmor profile to
    be ignored. This is not ideal, but for now it's probably the
    best solution. Thanks to intrigeri; closes: #880490.
  [ Simon Deziel ]
  * New upstream version: 0.3.0.13 (LP: #1731698)
    - Fix a denial of service bug where an attacker could use a
      malformed directory object to cause a Tor instance to pause while
      OpenSSL would try to read a passphrase from the terminal. (Tor
      instances run without a terminal, which is the case for most Tor
      packages, are not impacted.) Fixes bug 24246; bugfix on every
      version of Tor. Also tracked as TROVE-2017-011 and CVE-2017-8821.
      Found by OSS-Fuzz as testcase 6360145429790720.
    - Fix a denial of service issue where an attacker could crash a
      directory authority using a malformed router descriptor. Fixes bug
      24245; bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2017-010
      and CVE-2017-8820.
    - When checking for replays in the INTRODUCE1 cell data for a
      (legacy) onion service, correctly detect replays in the RSA-
      encrypted part of the cell. We were previously checking for
      replays on the entire cell, but those can be circumvented due to
      the malleability of Tor's legacy hybrid encryption. This fix helps
      prevent a traffic confirmation attack. Fixes bug 24244; bugfix on
      0.2.4.1-alpha. This issue is also tracked as TROVE-2017-009
      and CVE-2017-8819.
    - Fix a use-after-free error that could crash v2 Tor onion services
      when they failed to open circuits while expiring introduction
      points. Fixes bug 24313; bugfix on 0.2.7.2-alpha. This issue is
      also tracked as TROVE-2017-013 and CVE-2017-8823.
    - When running as a relay, make sure that we never build a path
      through ourselves, even in the case where we have somehow lost the
      version of our descriptor appearing in the consensus. Fixes part
      of bug 21534; bugfix on 0.2.0.1-alpha. This issue is also tracked
      as TROVE-2017-012 and CVE-2017-8822.
    - When running as a relay, make sure that we never choose ourselves
      as a guard. Fixes part of bug 21534; bugfix on 0.3.0.1-alpha. This
      issue is also tracked as TROVE-2017-012 and CVE-2017-8822.
  * New upstream version: 0.3.0.12
    - Directory authority changes
  * New upstream version: 0.3.0.11
    - Fix TROVE-2017-008: Stack disclosure in hidden services logs when
      SafeLogging disabled (CVE-2017-0380)
  * debian/rules: stop overriding micro-revision.i
  * apparmor: use Pix instead of PUx for obfs4proxy, giving us
    better confinement of the child process while actually working
    with systemd's NoNewPrivileges. (closes: #867342)
  * Drop versioned dependency on binutils. The version is already
    newer in all supported Debian and Ubuntu trees, and binutils
    is in the transitive dependency set of build-essential.
    Patch by Helmut Grohne. (closes: #873127)
  * Do not rely on aa-exec and aa-enabled being in /usr/sbin in the
    SysV init script. This change enables apparmor confinement
    on some system-V systems again. (closes: #869153)

ubuntu/xenial-proposed 2018-02-14 00:13:45 UTC 2018-02-14
Import patches-unapplied version 0.2.9.14-1ubuntu1~16.04.1 to ubuntu/xenial-p...

Author: Simon Déziel
Author Date: 2018-01-14 19:17:46 UTC

Import patches-unapplied version 0.2.9.14-1ubuntu1~16.04.1 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 7547237dc7f8b62990c0a73716526ebaa5513171

New changelog entries:
  [ Peter Palfrader ]
  * apparmor: use Pix instead of PUx for obfs4proxy, giving us
    better confinement of the child process while actually working
    with systemd's NoNewPrivileges. (closes: #867342)
  * Do not rely on aa-exec and aa-enabled being in /usr/sbin in the
    SysV init script. This change enables apparmor confinement
    on some system-V systems again. (closes: #869153)
  * Update apparmor profile: replace CAP_DAC_OVERRIDE with
    CAP_DAC_READ_SEARCH to match the systemd capability bounding set
    changed with 0.3.0.4-rc-1. This change will allow tor to start
    again under apparmor if hidden services are configured.
    Patch by intrigeri. (closes: #862993)
  * Replace CAP_DAC_OVERRIDE with CAP_DAC_READ_SEARCH in systemd's service
    capability bounding set. Read access is sufficient for Tor (as root on
    startup) to check its onion service directories (see #847598).
  * Change "AppArmorProfile=system_tor" to AppArmorProfile=-system_tor,
    causing all errors while switching to the new apparmor profile to
    be ignored. This is not ideal, but for now it's probably the
    best solution. Thanks to intrigeri; closes: #880490.
  [ Simon Deziel ]
  * Backport 0.2.9.14 to 16.04 (LP: #1731698)
  * debian/rules: stop overriding micro-revision.i
  * debian/control: drop build-conflicts
  * debian/control: Limit the seccomp build-dependency to [amd64 i386 x32 armel armhf]
  * Resync with Debian Stretch
  * New upstream version, including among others:
    - Fix an issue causing DNS to fail on high-bandwidth exit nodes,
      making them nearly unusable. Fixes bugs 21394 and 18580; bugfix on
      0.1.2.2-alpha, which introduced eventdns. Thanks to Dhalgren for
      identifying and finding a workaround to this bug and to Moritz,
      Arthur Edelstein, and Roger for helping to track it down and
      analyze it.
    - Fix a denial of service bug where an attacker could use a
      malformed directory object to cause a Tor instance to pause while
      OpenSSL would try to read a passphrase from the terminal. (Tor
      instances run without a terminal, which is the case for most Tor
      packages, are not impacted.) Fixes bug 24246; bugfix on every
      version of Tor. Also tracked as TROVE-2017-011 and CVE-2017-8821.
      Found by OSS-Fuzz as testcase 6360145429790720.
    - Fix a denial of service issue where an attacker could crash a
      directory authority using a malformed router descriptor. Fixes bug
      24245; bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2017-010
      and CVE-2017-8820.
    - When checking for replays in the INTRODUCE1 cell data for a
      (legacy) onion service, correctly detect replays in the RSA-
      encrypted part of the cell. We were previously checking for
      replays on the entire cell, but those can be circumvented due to
      the malleability of Tor's legacy hybrid encryption. This fix helps
      prevent a traffic confirmation attack. Fixes bug 24244; bugfix on
      0.2.4.1-alpha. This issue is also tracked as TROVE-2017-009
      and CVE-2017-8819.
    - Fix a use-after-free error that could crash v2 Tor onion services
      when they failed to open circuits while expiring introduction
      points. Fixes bug 24313; bugfix on 0.2.7.2-alpha. This issue is
      also tracked as TROVE-2017-013 and CVE-2017-8823.
    - When running as a relay, make sure that we never build a path
      through ourselves, even in the case where we have somehow lost the
      version of our descriptor appearing in the consensus. Fixes part
      of bug 21534; bugfix on 0.2.0.1-alpha. This issue is also tracked
      as TROVE-2017-012 and CVE-2017-8822.

applied/ubuntu/xenial-proposed 2018-02-14 00:13:45 UTC 2018-02-14
Import patches-applied version 0.2.9.14-1ubuntu1~16.04.1 to applied/ubuntu/xe...

Author: Simon Déziel
Author Date: 2018-01-14 19:17:46 UTC

Import patches-applied version 0.2.9.14-1ubuntu1~16.04.1 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 83e5c7ac88c33a90b6cd355efcee01875f1c91a0
Unapplied parent: 568e435a13c6a9189c1d0971bf6ad7f70f04fd0c

New changelog entries:
  [ Peter Palfrader ]
  * apparmor: use Pix instead of PUx for obfs4proxy, giving us
    better confinement of the child process while actually working
    with systemd's NoNewPrivileges. (closes: #867342)
  * Do not rely on aa-exec and aa-enabled being in /usr/sbin in the
    SysV init script. This change enables apparmor confinement
    on some system-V systems again. (closes: #869153)
  * Update apparmor profile: replace CAP_DAC_OVERRIDE with
    CAP_DAC_READ_SEARCH to match the systemd capability bounding set
    changed with 0.3.0.4-rc-1. This change will allow tor to start
    again under apparmor if hidden services are configured.
    Patch by intrigeri. (closes: #862993)
  * Replace CAP_DAC_OVERRIDE with CAP_DAC_READ_SEARCH in systemd's service
    capability bounding set. Read access is sufficient for Tor (as root on
    startup) to check its onion service directories (see #847598).
  * Change "AppArmorProfile=system_tor" to AppArmorProfile=-system_tor,
    causing all errors while switching to the new apparmor profile to
    be ignored. This is not ideal, but for now it's probably the
    best solution. Thanks to intrigeri; closes: #880490.
  [ Simon Deziel ]
  * Backport 0.2.9.14 to 16.04 (LP: #1731698)
  * debian/rules: stop overriding micro-revision.i
  * debian/control: drop build-conflicts
  * debian/control: Limit the seccomp build-dependency to [amd64 i386 x32 armel armhf]
  * Resync with Debian Stretch
  * New upstream version, including among others:
    - Fix an issue causing DNS to fail on high-bandwidth exit nodes,
      making them nearly unusable. Fixes bugs 21394 and 18580; bugfix on
      0.1.2.2-alpha, which introduced eventdns. Thanks to Dhalgren for
      identifying and finding a workaround to this bug and to Moritz,
      Arthur Edelstein, and Roger for helping to track it down and
      analyze it.
    - Fix a denial of service bug where an attacker could use a
      malformed directory object to cause a Tor instance to pause while
      OpenSSL would try to read a passphrase from the terminal. (Tor
      instances run without a terminal, which is the case for most Tor
      packages, are not impacted.) Fixes bug 24246; bugfix on every
      version of Tor. Also tracked as TROVE-2017-011 and CVE-2017-8821.
      Found by OSS-Fuzz as testcase 6360145429790720.
    - Fix a denial of service issue where an attacker could crash a
      directory authority using a malformed router descriptor. Fixes bug
      24245; bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2017-010
      and CVE-2017-8820.
    - When checking for replays in the INTRODUCE1 cell data for a
      (legacy) onion service, correctly detect replays in the RSA-
      encrypted part of the cell. We were previously checking for
      replays on the entire cell, but those can be circumvented due to
      the malleability of Tor's legacy hybrid encryption. This fix helps
      prevent a traffic confirmation attack. Fixes bug 24244; bugfix on
      0.2.4.1-alpha. This issue is also tracked as TROVE-2017-009
      and CVE-2017-8819.
    - Fix a use-after-free error that could crash v2 Tor onion services
      when they failed to open circuits while expiring introduction
      points. Fixes bug 24313; bugfix on 0.2.7.2-alpha. This issue is
      also tracked as TROVE-2017-013 and CVE-2017-8823.
    - When running as a relay, make sure that we never build a path
      through ourselves, even in the case where we have somehow lost the
      version of our descriptor appearing in the consensus. Fixes part
      of bug 21534; bugfix on 0.2.0.1-alpha. This issue is also tracked
      as TROVE-2017-012 and CVE-2017-8822.

ubuntu/zesty-devel 2017-08-24 15:53:22 UTC 2017-08-24
Import patches-unapplied version 0.2.9.11-1ubuntu1 to ubuntu/zesty-proposed

Author: Simon Déziel
Author Date: 2017-08-15 02:57:56 UTC

Import patches-unapplied version 0.2.9.11-1ubuntu1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 9797bd0806ef63033e3c5e4c6265b8614956bd0b

New changelog entries:
  * Backport from Debian Stretch to Zesty. Ubuntu Delta: (LP: #1710753)
    - Limit the seccomp build-dependency to [amd64 i386 armhf].
    - Drop build-conflicts.
    - Update debian/micro-revision.i to match 0.2.9.11 commit ID.
    - Use DAC_READ_SEARCH instead of DAC_OVERRIDE for Apparmor and
      systemd units. Cherry picked from 0.3.0.10-1 and 0.3.0.4-rc-1.

applied/ubuntu/zesty-devel 2017-08-24 15:53:22 UTC 2017-08-24
Import patches-applied version 0.2.9.11-1ubuntu1 to applied/ubuntu/zesty-prop...

Author: Simon Déziel
Author Date: 2017-08-15 02:57:56 UTC

Import patches-applied version 0.2.9.11-1ubuntu1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 3e6776316cec2127223605967fc9207134d97605
Unapplied parent: 7b49f67863842ce1c34dccb8039c522743e0ce60

New changelog entries:
  * Backport from Debian Stretch to Zesty. Ubuntu Delta: (LP: #1710753)
    - Limit the seccomp build-dependency to [amd64 i386 armhf].
    - Drop build-conflicts.
    - Update debian/micro-revision.i to match 0.2.9.11 commit ID.
    - Use DAC_READ_SEARCH instead of DAC_OVERRIDE for Apparmor and
      systemd units. Cherry picked from 0.3.0.10-1 and 0.3.0.4-rc-1.

ubuntu/zesty-updates 2017-08-24 15:53:22 UTC 2017-08-24
Import patches-unapplied version 0.2.9.11-1ubuntu1 to ubuntu/zesty-proposed

Author: Simon Déziel
Author Date: 2017-08-15 02:57:56 UTC

Import patches-unapplied version 0.2.9.11-1ubuntu1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 9797bd0806ef63033e3c5e4c6265b8614956bd0b

New changelog entries:
  * Backport from Debian Stretch to Zesty. Ubuntu Delta: (LP: #1710753)
    - Limit the seccomp build-dependency to [amd64 i386 armhf].
    - Drop build-conflicts.
    - Update debian/micro-revision.i to match 0.2.9.11 commit ID.
    - Use DAC_READ_SEARCH instead of DAC_OVERRIDE for Apparmor and
      systemd units. Cherry picked from 0.3.0.10-1 and 0.3.0.4-rc-1.

ubuntu/zesty-proposed 2017-08-24 15:53:22 UTC 2017-08-24
Import patches-unapplied version 0.2.9.11-1ubuntu1 to ubuntu/zesty-proposed

Author: Simon Déziel
Author Date: 2017-08-15 02:57:56 UTC

Import patches-unapplied version 0.2.9.11-1ubuntu1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 9797bd0806ef63033e3c5e4c6265b8614956bd0b

New changelog entries:
  * Backport from Debian Stretch to Zesty. Ubuntu Delta: (LP: #1710753)
    - Limit the seccomp build-dependency to [amd64 i386 armhf].
    - Drop build-conflicts.
    - Update debian/micro-revision.i to match 0.2.9.11 commit ID.
    - Use DAC_READ_SEARCH instead of DAC_OVERRIDE for Apparmor and
      systemd units. Cherry picked from 0.3.0.10-1 and 0.3.0.4-rc-1.

applied/ubuntu/zesty-updates 2017-08-24 15:53:22 UTC 2017-08-24
Import patches-applied version 0.2.9.11-1ubuntu1 to applied/ubuntu/zesty-prop...

Author: Simon Déziel
Author Date: 2017-08-15 02:57:56 UTC

Import patches-applied version 0.2.9.11-1ubuntu1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 3e6776316cec2127223605967fc9207134d97605
Unapplied parent: 7b49f67863842ce1c34dccb8039c522743e0ce60

New changelog entries:
  * Backport from Debian Stretch to Zesty. Ubuntu Delta: (LP: #1710753)
    - Limit the seccomp build-dependency to [amd64 i386 armhf].
    - Drop build-conflicts.
    - Update debian/micro-revision.i to match 0.2.9.11 commit ID.
    - Use DAC_READ_SEARCH instead of DAC_OVERRIDE for Apparmor and
      systemd units. Cherry picked from 0.3.0.10-1 and 0.3.0.4-rc-1.

applied/ubuntu/zesty-proposed 2017-08-24 15:53:22 UTC 2017-08-24
Import patches-applied version 0.2.9.11-1ubuntu1 to applied/ubuntu/zesty-prop...

Author: Simon Déziel
Author Date: 2017-08-15 02:57:56 UTC

Import patches-applied version 0.2.9.11-1ubuntu1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 3e6776316cec2127223605967fc9207134d97605
Unapplied parent: 7b49f67863842ce1c34dccb8039c522743e0ce60

New changelog entries:
  * Backport from Debian Stretch to Zesty. Ubuntu Delta: (LP: #1710753)
    - Limit the seccomp build-dependency to [amd64 i386 armhf].
    - Drop build-conflicts.
    - Update debian/micro-revision.i to match 0.2.9.11 commit ID.
    - Use DAC_READ_SEARCH instead of DAC_OVERRIDE for Apparmor and
      systemd units. Cherry picked from 0.3.0.10-1 and 0.3.0.4-rc-1.

ubuntu/artful 2017-08-13 22:37:46 UTC 2017-08-13
Import patches-unapplied version 0.3.0.10-1 to debian/sid

Author: Peter Palfrader
Author Date: 2017-08-13 15:24:23 UTC

Import patches-unapplied version 0.3.0.10-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 6c674f42bbdbd327154dff36bc403e6ccf2faf8e

New changelog entries:
  * New upstream version.
  * Update apparmor profile: replace CAP_DAC_OVERRIDE with
    CAP_DAC_READ_SEARCH to match the systemd capability bounding set
    changed with 0.3.0.4-rc-1. This change will allow tor to start
    again under apparmor if hidden services are configured.
    Patch by intrigeri. (closes: #862993)
  * Remove tor-dbg binary package. Nowadays Debian's toolchain
    automatically builds packages containing debugging symbols. The new
    tor-dbgsym package will end up in the debian-debug archive.
    This tor-dbgsym package will Replace/Break tor-dbg versions
    prior to 0.3.1.5-alpha for now (to match the version in experimental
    with the same change), but as we keep providing backported builds for
    older suites, and since those keep the tor-dbg package for now,
    we'll likely keep increasing this version in future releases.
    (closes: #867547)
  * The dbgsym migration options require debhelper >= 9.20160114; update
    build dependency list accordingly.

applied/ubuntu/artful 2017-08-13 22:37:46 UTC 2017-08-13
Import patches-applied version 0.3.0.10-1 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2017-08-13 15:24:23 UTC

Import patches-applied version 0.3.0.10-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 70e8d9a80854ffbbe38464ef21adc38dc972cae4
Unapplied parent: 2c882b3dabfc15b3d3e942deb063095dfd470724

New changelog entries:
  * New upstream version.
  * Update apparmor profile: replace CAP_DAC_OVERRIDE with
    CAP_DAC_READ_SEARCH to match the systemd capability bounding set
    changed with 0.3.0.4-rc-1. This change will allow tor to start
    again under apparmor if hidden services are configured.
    Patch by intrigeri. (closes: #862993)
  * Remove tor-dbg binary package. Nowadays Debian's toolchain
    automatically builds packages containing debugging symbols. The new
    tor-dbgsym package will end up in the debian-debug archive.
    This tor-dbgsym package will Replace/Break tor-dbg versions
    prior to 0.3.1.5-alpha for now (to match the version in experimental
    with the same change), but as we keep providing backported builds for
    older suites, and since those keep the tor-dbg package for now,
    we'll likely keep increasing this version in future releases.
    (closes: #867547)
  * The dbgsym migration options require debhelper >= 9.20160114; update
    build dependency list accordingly.

ubuntu/zesty 2017-03-08 07:48:25 UTC 2017-03-08
Import patches-unapplied version 0.2.9.10-1ubuntu1 to ubuntu/zesty-proposed

Author: Gianfranco Costamagna
Author Date: 2017-03-08 07:25:29 UTC

Import patches-unapplied version 0.2.9.10-1ubuntu1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 5a81d26d7a9a41a4a7e6e883d929de895ba6e4ca

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Limit the seccomp build-dependency to [amd64 i386 armhf].

applied/ubuntu/zesty 2017-03-08 07:48:25 UTC 2017-03-08
Import patches-applied version 0.2.9.10-1ubuntu1 to applied/ubuntu/zesty-prop...

Author: Gianfranco Costamagna
Author Date: 2017-03-08 07:25:29 UTC

Import patches-applied version 0.2.9.10-1ubuntu1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: c61e2cdeb41920500ad31655b2f2d3d073758161
Unapplied parent: 7110d843fc7f7e109ddebe98f8092ef78994bc41

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Limit the seccomp build-dependency to [amd64 i386 armhf].

applied/ubuntu/yakkety-proposed 2016-09-26 08:18:56 UTC 2016-09-26
Import patches-applied version 0.2.8.8-1ubuntu1 to applied/ubuntu/yakkety-pro...

Author: Gianfranco Costamagna
Author Date: 2016-09-26 07:02:25 UTC

Import patches-applied version 0.2.8.8-1ubuntu1 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 6cd696e5a7007db9d39ec7e1d97f9b461e30481a
Unapplied parent: 30177884faa04e2c617a8e48b4e3b230b6482808

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Limit the seccomp build-dependency to [amd64 i386 armhf].

ubuntu/yakkety 2016-09-26 08:18:56 UTC 2016-09-26
Import patches-unapplied version 0.2.8.8-1ubuntu1 to ubuntu/yakkety-proposed

Author: Gianfranco Costamagna
Author Date: 2016-09-26 07:02:25 UTC

Import patches-unapplied version 0.2.8.8-1ubuntu1 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 674b9f843fb228821f7dad65db6ac37c7be62041

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Limit the seccomp build-dependency to [amd64 i386 armhf].

ubuntu/yakkety-devel 2016-09-26 08:18:56 UTC 2016-09-26
Import patches-unapplied version 0.2.8.8-1ubuntu1 to ubuntu/yakkety-proposed

Author: Gianfranco Costamagna
Author Date: 2016-09-26 07:02:25 UTC

Import patches-unapplied version 0.2.8.8-1ubuntu1 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 674b9f843fb228821f7dad65db6ac37c7be62041

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Limit the seccomp build-dependency to [amd64 i386 armhf].

ubuntu/yakkety-proposed 2016-09-26 08:18:56 UTC 2016-09-26
Import patches-unapplied version 0.2.8.8-1ubuntu1 to ubuntu/yakkety-proposed

Author: Gianfranco Costamagna
Author Date: 2016-09-26 07:02:25 UTC

Import patches-unapplied version 0.2.8.8-1ubuntu1 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 674b9f843fb228821f7dad65db6ac37c7be62041

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Limit the seccomp build-dependency to [amd64 i386 armhf].

applied/ubuntu/yakkety 2016-09-26 08:18:56 UTC 2016-09-26
Import patches-applied version 0.2.8.8-1ubuntu1 to applied/ubuntu/yakkety-pro...

Author: Gianfranco Costamagna
Author Date: 2016-09-26 07:02:25 UTC

Import patches-applied version 0.2.8.8-1ubuntu1 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 6cd696e5a7007db9d39ec7e1d97f9b461e30481a
Unapplied parent: 30177884faa04e2c617a8e48b4e3b230b6482808

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Limit the seccomp build-dependency to [amd64 i386 armhf].

applied/ubuntu/yakkety-devel 2016-09-26 08:18:56 UTC 2016-09-26
Import patches-applied version 0.2.8.8-1ubuntu1 to applied/ubuntu/yakkety-pro...

Author: Gianfranco Costamagna
Author Date: 2016-09-26 07:02:25 UTC

Import patches-applied version 0.2.8.8-1ubuntu1 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 6cd696e5a7007db9d39ec7e1d97f9b461e30481a
Unapplied parent: 30177884faa04e2c617a8e48b4e3b230b6482808

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Limit the seccomp build-dependency to [amd64 i386 armhf].

applied/ubuntu/xenial 2016-03-22 13:38:46 UTC 2016-03-22
Import patches-applied version 0.2.7.6-1ubuntu1 to applied/ubuntu/xenial-prop...

Author: Gianfranco Costamagna
Author Date: 2016-03-22 12:59:13 UTC

Import patches-applied version 0.2.7.6-1ubuntu1 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 0d6d37df84e03b2ea8ecea911e6878d0bdd773c8
Unapplied parent: 1b3fab6a07aa2237f1d2cdbe1ba5342b623a5464

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Limit the seccomp build-dependency to [amd64 i386 x32 armel armhf].

ubuntu/xenial 2016-03-22 13:38:46 UTC 2016-03-22
Import patches-unapplied version 0.2.7.6-1ubuntu1 to ubuntu/xenial-proposed

Author: Gianfranco Costamagna
Author Date: 2016-03-22 12:59:13 UTC

Import patches-unapplied version 0.2.7.6-1ubuntu1 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 4643e97d8b72f6ca09257c71cfb097a6f101fcac

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Limit the seccomp build-dependency to [amd64 i386 x32 armel armhf].

ubuntu/wily 2015-10-05 09:08:42 UTC 2015-10-05
Import patches-unapplied version 0.2.6.10-1ubuntu2 to ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-10-05 08:56:51 UTC

Import patches-unapplied version 0.2.6.10-1ubuntu2 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: a15e30e059be81da78768598c647b45c0ab69d5d

New changelog entries:
  * Limit the seccomp build-dependency to [amd64 i386 x32 armel armhf].
    Fails on other archs with
    error: 'mcontext_t {aka struct sigcontext}' has no member named 'M_SYSCALL'.

applied/ubuntu/wily 2015-10-05 09:08:42 UTC 2015-10-05
Import patches-applied version 0.2.6.10-1ubuntu2 to applied/ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-10-05 08:56:51 UTC

Import patches-applied version 0.2.6.10-1ubuntu2 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 5c838f9f855c0a5a7570d3880748008f4ef5d997
Unapplied parent: 057106f3535da7cc1653cbcdf16c4f593e19a7e4

New changelog entries:
  * Limit the seccomp build-dependency to [amd64 i386 x32 armel armhf].
    Fails on other archs with
    error: 'mcontext_t {aka struct sigcontext}' has no member named 'M_SYSCALL'.

applied/ubuntu/wily-devel 2015-10-05 09:08:42 UTC 2015-10-05
Import patches-applied version 0.2.6.10-1ubuntu2 to applied/ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-10-05 08:56:51 UTC

Import patches-applied version 0.2.6.10-1ubuntu2 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 5c838f9f855c0a5a7570d3880748008f4ef5d997
Unapplied parent: 057106f3535da7cc1653cbcdf16c4f593e19a7e4

New changelog entries:
  * Limit the seccomp build-dependency to [amd64 i386 x32 armel armhf].
    Fails on other archs with
    error: 'mcontext_t {aka struct sigcontext}' has no member named 'M_SYSCALL'.

applied/ubuntu/wily-proposed 2015-10-05 09:08:42 UTC 2015-10-05
Import patches-applied version 0.2.6.10-1ubuntu2 to applied/ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-10-05 08:56:51 UTC

Import patches-applied version 0.2.6.10-1ubuntu2 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 5c838f9f855c0a5a7570d3880748008f4ef5d997
Unapplied parent: 057106f3535da7cc1653cbcdf16c4f593e19a7e4

New changelog entries:
  * Limit the seccomp build-dependency to [amd64 i386 x32 armel armhf].
    Fails on other archs with
    error: 'mcontext_t {aka struct sigcontext}' has no member named 'M_SYSCALL'.

ubuntu/wily-proposed 2015-10-05 09:08:42 UTC 2015-10-05
Import patches-unapplied version 0.2.6.10-1ubuntu2 to ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-10-05 08:56:51 UTC

Import patches-unapplied version 0.2.6.10-1ubuntu2 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: a15e30e059be81da78768598c647b45c0ab69d5d

New changelog entries:
  * Limit the seccomp build-dependency to [amd64 i386 x32 armel armhf].
    Fails on other archs with
    error: 'mcontext_t {aka struct sigcontext}' has no member named 'M_SYSCALL'.

ubuntu/wily-devel 2015-10-05 09:08:42 UTC 2015-10-05
Import patches-unapplied version 0.2.6.10-1ubuntu2 to ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-10-05 08:56:51 UTC

Import patches-unapplied version 0.2.6.10-1ubuntu2 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: a15e30e059be81da78768598c647b45c0ab69d5d

New changelog entries:
  * Limit the seccomp build-dependency to [amd64 i386 x32 armel armhf].
    Fails on other archs with
    error: 'mcontext_t {aka struct sigcontext}' has no member named 'M_SYSCALL'.

debian/wheezy 2015-09-05 17:14:39 UTC 2015-09-05
Import patches-unapplied version 0.2.4.27-1 to debian/wheezy

Author: Peter Palfrader
Author Date: 2015-04-06 15:30:17 UTC

Import patches-unapplied version 0.2.4.27-1 to debian/wheezy

Imported using git-ubuntu import.

Changelog parent: 85839522f5dc039e03a9697715636692555b5dd6

New changelog entries:
  * New upstream version, fixing hidden service related Denial of
    Service bugs:
    - Fix two remotely triggerable assertion failures (upstream bugs
      #15600 and #15601).
    - Disallow multiple INTRODUCE1 cells on the same circuit at introduction
      points, making overwhelming hidden services with introductions more
      expensive (upstream bug #15515).
  * New upstream version.
    + Fixes the following security relevant issues (copied from upstream
      changelog):
      - Fix an assertion failure that could occur under high DNS load.
        Fixes bug 14129; bugfix on Tor 0.0.7rc1. Found by "jowr";
        diagnosed and fixed by "cypherpunks".
      - Fix a bug that could lead to a relay crashing with an assertion
        failure if a buffer of exactly the wrong layout was passed to
        buf_pullup() at exactly the wrong time. Fixes bug 15083; bugfix on
        0.2.0.10-alpha. Patch from 'cypherpunks'.
      - Do not assert if the 'data' pointer on a buffer is advanced to the
        very end of the buffer; log a BUG message instead. Only assert if
        it is past that point. Fixes bug 15083; bugfix on 0.2.0.10-alpha.
      - Disable support for SSLv3. All versions of OpenSSL in use with Tor
        today support TLS 1.0 or later, so we can safely turn off support
        for this old (and insecure) protocol. Fixes bug 13426.
    + Updates the list of directory authorities and the geoIP database.

applied/debian/wheezy 2015-09-05 17:14:39 UTC 2015-09-05
Import patches-applied version 0.2.4.27-1 to applied/debian/wheezy

Author: Peter Palfrader
Author Date: 2015-04-06 15:30:17 UTC

Import patches-applied version 0.2.4.27-1 to applied/debian/wheezy

Imported using git-ubuntu import.

Changelog parent: 8519207399c58148a822e129a1bf805de6b767e7
Unapplied parent: 73b0a3a9a5c4ed9494ffffa7576f9988dbc431e7

New changelog entries:
  * New upstream version, fixing hidden service related Denial of
    Service bugs:
    - Fix two remotely triggerable assertion failures (upstream bugs
      #15600 and #15601).
    - Disallow multiple INTRODUCE1 cells on the same circuit at introduction
      points, making overwhelming hidden services with introductions more
      expensive (upstream bug #15515).
  * New upstream version.
    + Fixes the following security relevant issues (copied from upstream
      changelog):
      - Fix an assertion failure that could occur under high DNS load.
        Fixes bug 14129; bugfix on Tor 0.0.7rc1. Found by "jowr";
        diagnosed and fixed by "cypherpunks".
      - Fix a bug that could lead to a relay crashing with an assertion
        failure if a buffer of exactly the wrong layout was passed to
        buf_pullup() at exactly the wrong time. Fixes bug 15083; bugfix on
        0.2.0.10-alpha. Patch from 'cypherpunks'.
      - Do not assert if the 'data' pointer on a buffer is advanced to the
        very end of the buffer; log a BUG message instead. Only assert if
        it is past that point. Fixes bug 15083; bugfix on 0.2.0.10-alpha.
      - Disable support for SSLv3. All versions of OpenSSL in use with Tor
        today support TLS 1.0 or later, so we can safely turn off support
        for this old (and insecure) protocol. Fixes bug 13426.
    + Updates the list of directory authorities and the geoIP database.

applied/ubuntu/vivid-security 2015-07-29 13:03:39 UTC 2015-07-29
Import patches-applied version 0.2.5.12-1build0.15.04.1 to applied/ubuntu/viv...

Author: Marc Deslauriers
Author Date: 2015-07-29 11:58:16 UTC

Import patches-applied version 0.2.5.12-1build0.15.04.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: e52574db2302b577a888b1f34808b6ed61725f77
Unapplied parent: b69177194163444054c0efd55a016317f6c38631

New changelog entries:
  * Sync from Debian as a security update

applied/ubuntu/vivid-devel 2015-07-29 13:03:39 UTC 2015-07-29
Import patches-applied version 0.2.5.12-1build0.15.04.1 to applied/ubuntu/viv...

Author: Marc Deslauriers
Author Date: 2015-07-29 11:58:16 UTC

Import patches-applied version 0.2.5.12-1build0.15.04.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: e52574db2302b577a888b1f34808b6ed61725f77
Unapplied parent: b69177194163444054c0efd55a016317f6c38631

New changelog entries:
  * Sync from Debian as a security update

ubuntu/vivid-devel 2015-07-29 13:03:39 UTC 2015-07-29
Import patches-unapplied version 0.2.5.12-1build0.15.04.1 to ubuntu/vivid-sec...

Author: Marc Deslauriers
Author Date: 2015-07-29 11:58:16 UTC

Import patches-unapplied version 0.2.5.12-1build0.15.04.1 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: faaeee7d42858886198452a3bf540229aa7a32bc

New changelog entries:
  * Sync from Debian as a security update

ubuntu/vivid-updates 2015-07-29 13:03:39 UTC 2015-07-29
Import patches-unapplied version 0.2.5.12-1build0.15.04.1 to ubuntu/vivid-sec...

Author: Marc Deslauriers
Author Date: 2015-07-29 11:58:16 UTC

Import patches-unapplied version 0.2.5.12-1build0.15.04.1 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: faaeee7d42858886198452a3bf540229aa7a32bc

New changelog entries:
  * Sync from Debian as a security update

ubuntu/vivid-security 2015-07-29 13:03:39 UTC 2015-07-29
Import patches-unapplied version 0.2.5.12-1build0.15.04.1 to ubuntu/vivid-sec...

Author: Marc Deslauriers
Author Date: 2015-07-29 11:58:16 UTC

Import patches-unapplied version 0.2.5.12-1build0.15.04.1 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: faaeee7d42858886198452a3bf540229aa7a32bc

New changelog entries:
  * Sync from Debian as a security update

applied/ubuntu/vivid-updates 2015-07-29 13:03:39 UTC 2015-07-29
Import patches-applied version 0.2.5.12-1build0.15.04.1 to applied/ubuntu/viv...

Author: Marc Deslauriers
Author Date: 2015-07-29 11:58:16 UTC

Import patches-applied version 0.2.5.12-1build0.15.04.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: e52574db2302b577a888b1f34808b6ed61725f77
Unapplied parent: b69177194163444054c0efd55a016317f6c38631

New changelog entries:
  * Sync from Debian as a security update

ubuntu/vivid 2014-10-24 22:27:21 UTC 2014-10-24
Import patches-unapplied version 0.2.5.10-1 to debian/sid

Author: Peter Palfrader
Author Date: 2014-10-24 14:05:28 UTC

Import patches-unapplied version 0.2.5.10-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: a6ee8f3229def58e40fca8c4a971c7ef102ec4f1

New changelog entries:
  * New upstream version.
  * Use "service tor reload", guarded by "service tor status" in logrotate
    instead as suggested by Dirk Griesbach (closes: #765407).

applied/ubuntu/vivid-proposed 2014-10-24 22:27:21 UTC 2014-10-24
Import patches-applied version 0.2.5.10-1 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2014-10-24 14:05:28 UTC

Import patches-applied version 0.2.5.10-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: a05fc44a559c5e1c7c26f04472362dd24ec8fcd9
Unapplied parent: 68c55c40203d849d253bc5d9675e3ef329836f98

New changelog entries:
  * New upstream version.
  * Use "service tor reload", guarded by "service tor status" in logrotate
    instead as suggested by Dirk Griesbach (closes: #765407).

ubuntu/vivid-proposed 2014-10-24 22:27:21 UTC 2014-10-24
Import patches-unapplied version 0.2.5.10-1 to debian/sid

Author: Peter Palfrader
Author Date: 2014-10-24 14:05:28 UTC

Import patches-unapplied version 0.2.5.10-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: a6ee8f3229def58e40fca8c4a971c7ef102ec4f1

New changelog entries:
  * New upstream version.
  * Use "service tor reload", guarded by "service tor status" in logrotate
    instead as suggested by Dirk Griesbach (closes: #765407).

applied/ubuntu/vivid 2014-10-24 22:27:21 UTC 2014-10-24
Import patches-applied version 0.2.5.10-1 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2014-10-24 14:05:28 UTC

Import patches-applied version 0.2.5.10-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: a05fc44a559c5e1c7c26f04472362dd24ec8fcd9
Unapplied parent: 68c55c40203d849d253bc5d9675e3ef329836f98

New changelog entries:
  * New upstream version.
  * Use "service tor reload", guarded by "service tor status" in logrotate
    instead as suggested by Dirk Griesbach (closes: #765407).

ubuntu/utopic 2014-07-29 04:25:45 UTC 2014-07-29
Import patches-unapplied version 0.2.4.23-1 to debian/sid

Author: Peter Palfrader
Author Date: 2014-07-28 20:22:24 UTC

Import patches-unapplied version 0.2.4.23-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 1a12af0d8b46e51c33699f256b4b640d55c35eac

New changelog entries:
  * New upstream version.

applied/ubuntu/utopic 2014-07-29 04:25:45 UTC 2014-07-29
Import patches-applied version 0.2.4.23-1 to applied/debian/sid

Author: Peter Palfrader
Author Date: 2014-07-28 20:22:24 UTC

Import patches-applied version 0.2.4.23-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 9b2c39a7761488f6d580632341983633e0a89d4e
Unapplied parent: fac68c3c745504fae936bcc6493b7859889a87d7

New changelog entries:
  * New upstream version.

1100 of 196 results

Other repositories

Name Last Modified
lp:ubuntu/+source/tor 2019-07-28
11 of 1 result
You can't create new repositories for tor in Ubuntu.