Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with '030-backport'

  • #6767 defect: tor crashes with Assertion smartlist_get(rl->old_routers, idx) == sd failed (accepted)
  • #8185 defect: circuit_package_relay_cell(): Bug: outgoing relay cell has ... (closed: fixed)
  • #15582 defect: compile warning in test_util.c: In function 'test_util_sscanf' (closed: fixed)
  • #19760 defect: Update longclaw's hard-coded IPv6 address (closed: implemented)
  • #21394 defect: connection timeouts are affecting Tor Browser usability (needs_review)
  • #21470 task: Write unit tests for security regressions (closed: fixed)
  • #21540 defect: Warning "Failure from drain_fd" (closed: fixed)
  • #21800 defect: test suite triggers Bug: Result does not fit in tor_timegm but does ... (closed: fixed)
  • #21953 defect: Dealing with Tor hardening on Windows properly (closed: implemented)
  • #22204 defect: I can't list a relay in my EntryNodes if it doesn't have the Guard flag (new)
  • #22349 defect: dir auth attempts to fetch a descriptor every minute for every relay ... (closed: fixed)
  • #22400 defect: We bootstrap from different primary guards when we start with a ... (needs_information)
  • #22489 defect: Bridge oftenly reports Failed to find node for hop 0 of our path. ... (needs_information)
  • #22644 defect: Assert crash with HSPOST and POSTDESCRIPTOR control port commands (closed: fixed)
  • #22660 defect: Guard against stack smashing attacks in tor with additional compiler ... (needs_revision)
  • #22789 defect: Tor 0.3.1.4-alpha crash on OpenBSD-current (closed: fixed)
  • #22797 defect: macOS should use ULIMIT_BUFFER for open files (closed: fixed)
  • #22801 defect: Warnings from isnan, isinfinite, signbit on mingw (closed: fixed)
  • #22895 defect: Unused variables in donna's SSE2 header (closed: fixed)
  • #22921 defect: Tor 0.3.0.9 and 0.3.1.4-alpha on FreeBSD: Failed to find node for hop ... (needs_information)
  • #23053 task: Memory leak of unix_socket_path when validating multiple unix sockets (closed: fixed)
  • #23061 defect: crypto_rand_double() should produce all possible outputs on platforms ... (needs_revision)
  • #23081 defect: Tor relay crashes at consensus_diff_queue_diff_work() with assertion ... (closed: fixed)
  • #23250 defect: tor-0.3.0.10: test failure on NetBSD (new)
  • #23291 defect: unintentional undefined behaviore in test-memwipe.c (closed: fixed)
  • #23318 defect: compute_weighted_bandwidths: do not add 0.5 to final_weight (merge_ready)
  • #23323 defect: sample_laplace_distribution should produce a valid result on 0.0 (assigned)
  • #23414 defect: rep_hist_format_hs_stats() should add noise, then round (needs_revision)
  • #23415 defect: sample_laplace_distribution() should take multiple random inputs (assigned)
  • #23470 defect: Avoid relays resolving their own address on every download status check (closed: fixed)
  • #23487 defect: Incorrect output on bad directory ownership (closed: fixed)
  • #23524 defect: Avoid crashing when we ask for running bridges, but UseBridges is 0 (closed: fixed)
  • #23533 defect: Repair bug in geoip/rephist reporting from relays that only download ... (closed: fixed)
  • #23583 defect: ext/timeouts/timeout-bitops.c:234: bad shift (closed: fixed)
  • #23584 defect: tor-0.3.1.7/src/or/torcert.c:396: bad expression ? (closed: duplicate)
  • #23610 defect: handle_establish_intro() can mark circuits for close twice (closed: fixed)
  • #23681 defect: prop224: Clients mark intro circs as timed-out within seconds (merge_ready)
  • #23690 defect: Assertion *buf_flushlen <= buf->datalen failed (closed: fixed)
  • #23862 defect: Tor only updates guard state after a consensus if it has enough ... (closed: fixed)
  • #23874 defect: Clear the address when node_get_prim_orport() returns early (closed: fixed)
  • #23985 defect: If less than 15 missing mds, Tor will delay md download for 10 mins (closed: fixed)
  • #23989 defect: entry_guards_update_all() will pretend to update primaries even if ... (accepted)
  • #24043 defect: monotonic time test failure on 0.3.0.x (reopened)
  • #24167 defect: connection_check_event: Bug: Event missing on connection (closed: fixed)
  • #24170 defect: Log the actual bandwidth total when logging "Generated weighted bandwidths" (closed: fixed)
  • #24198 defect: (Sandbox) Caught a bad syscall attempt (syscall kill) (merge_ready)
  • #24279 defect: configure libevent leaks (closed: fixed)
  • #24367 defect: Changing pluggable transports (during start-up) in Tor Browser is broken (needs_information)
  • #24392 defect: Ignore cached bridge descriptors until we check if they are running (merge_ready)
  • #24394 enhancement: add ipv6 dirauth address (closed: implemented)
  • #24424 defect: fails to build with libseccomp-dev installed on arm64 (closed: fixed)
  • #24633 defect: to->pending->tqh_last is 0xFFFFFFFFFFFFFFFF。 (closed: fixed)
  • #24736 defect: Clear the address when fascist_firewall_choose_address_base() can't ... (closed: fixed)
  • #24801 enhancement: Generate a new fallback list and backport it (closed: implemented)
  • #24854 enhancement: Extract the authority list from config.c (new)
  • #24895 defect: MAX_REND_FAILURES is 1, but we will try three times (closed: fixed)