[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted tor 0.2.3.21-rc-1 (source all amd64)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Fri,  7 Sep 2012 10:55:07 UTC
Source: tor
Binary: tor tor-dbg tor-geoipdb
Architecture: source all amd64
Version: 0.2.3.21-rc-1
Distribution: unstable
Urgency: low
Maintainer: Peter Palfrader <weasel@debian.org>
Changed-By: Peter Palfrader <weasel@debian.org>
Description: 
 tor        - anonymizing overlay network for TCP
 tor-dbg    - debugging symbols for Tor
 tor-geoipdb - GeoIP database for Tor
Checksums-Sha1: 
 b7d3ca7e84d8f7a23e51760d831c848ce70bcbe6 1683 tor_0.2.3.21-rc-1.dsc
 6e958a75980502cf7e233d754dfa14f67fc39f89 3163066 tor_0.2.3.21-rc.orig.tar.gz
 dfe9855c4e148c8ff5cf77440062eb8b4d0f265c 33583 tor_0.2.3.21-rc-1.diff.gz
 780c0291a0df05b0919a69fc4807640440e06a53 1447310 tor-geoipdb_0.2.3.21-rc-1_all.deb
 bc21f9795c726714f7ff8e72fdcc28b878876583 1190664 tor_0.2.3.21-rc-1_amd64.deb
 9537a314f9e56249f8f64aa3e22b3d52d920b976 94732 tor-dbg_0.2.3.21-rc-1_amd64.deb
Checksums-Sha256: 
 192c302b0b54f11bcdb1c98a17eb3d2504c03bfd8f57c33fba8de67d2f9cdacd 1683 tor_0.2.3.21-rc-1.dsc
 e31f4c5b91b76298657563441289783c5425007516d8e42f0e43748f129e9531 3163066 tor_0.2.3.21-rc.orig.tar.gz
 e690c9f1e076c16217fccc8c849736f5578f3d7dafc99081725c89f0e7f0e37b 33583 tor_0.2.3.21-rc-1.diff.gz
 cbbaee165f875248d65d18aeec6d2383f346bc0d6aa54d8c2cf0494ddc36ccbc 1447310 tor-geoipdb_0.2.3.21-rc-1_all.deb
 38c7694463114cee3847eb17b3526b68a8f2ef489e295acf6876052193e8166c 1190664 tor_0.2.3.21-rc-1_amd64.deb
 1d30ec07777279ffa3c83bb4dabdf2e4df6cbeedff50932728388454208e4923 94732 tor-dbg_0.2.3.21-rc-1_amd64.deb
Changes: 
 tor (0.2.3.21-rc-1) unstable; urgency=low
 .
   * New upstream version, changes including:
     - Tear down the circuit if we get an unexpected SENDME cell. Clients
       could use this trick to make their circuits receive cells faster
       than our flow control would have allowed, or to gum up the network,
       or possibly to do targeted memory denial-of-service attacks on
       entry nodes.
     - Reject any attempt to extend to an internal address. Without
       this fix, a router could be used to probe addresses on an internal
       network to see whether they were accepting connections.
     - Do not crash when comparing an address with port value 0 to an
       address policy.
     For details please see the upstream changelog.
Files: 
 e890c0582dc5e5cb31cf72da37052dba 1683 net optional tor_0.2.3.21-rc-1.dsc
 71c8d8e48c35e26655468706272b72be 3163066 net optional tor_0.2.3.21-rc.orig.tar.gz
 0708404b67e2530c5a95d6e35b3636e2 33583 net optional tor_0.2.3.21-rc-1.diff.gz
 1dc24361309f143045815fa364d17609 1447310 net extra tor-geoipdb_0.2.3.21-rc-1_all.deb
 731e1441ec2c2c24e46ba5ae5a6740c0 1190664 net optional tor_0.2.3.21-rc-1_amd64.deb
 7b76e74b907c809c45619e074e5f070e 94732 debug extra tor-dbg_0.2.3.21-rc-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBCAAGBQJQShWXAAoJEDTSCgbh3sV3p+cH/RQI324G503imvmsEHKe5Fbg
rJ922TW6aqU9+yY/BiLN67tb81dfr2SRddLNW4NKuS7nxGHd5QH0E2eg+dpvtdPk
drJa+ehjA6LsyRgr9Iw3nt1axJC2su2GGRXY+pugVK75mf/evhFLnIxVZKRYnrFy
5tj6noRVoYLeC/SOjHPVDJ6vIkfnq5aVewuPdAoZ9FtJN9WlwmWfKvSFWF9c2oqq
y3No3pPaTEra4KmO9aMajlim2bWV1fjHwMfzYRgMBT9FIHaxZlguPG4PMrT6F6hA
82aTdFzWP+KLKpUjJEDXgh7kg6d9f2EW3/iPV2+sPz8AfQ0iUdE1+afxANzjAPo=
=GIjR
-----END PGP SIGNATURE-----


Reply to: