Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with '031-backport'

  • #6767 defect: tor crashes with Assertion smartlist_get(rl->old_routers, idx) == sd failed (accepted)
  • #8185 defect: circuit_package_relay_cell(): Bug: outgoing relay cell has ... (closed: fixed)
  • #15582 defect: compile warning in test_util.c: In function 'test_util_sscanf' (closed: fixed)
  • #17145 defect: <tor.exe --service install -options -f ...\torrc> returns Error 1064 ... (new)
  • #18859 defect: A new SOCKS connection should use a pre-built circuit for its first stream (merge_ready)
  • #19760 defect: Update longclaw's hard-coded IPv6 address (closed: implemented)
  • #21074 defect: setrlimit fails OSX Sierra (merge_ready)
  • #21394 defect: connection timeouts are affecting Tor Browser usability (needs_review)
  • #22563 defect: Many memory pages in tor.exe for Windows violate WX (closed: fixed)
  • #22605 defect: sandbox_intern_string(): Bug: No interned sandbox parameter found for ... (closed: fixed)
  • #22644 defect: Assert crash with HSPOST and POSTDESCRIPTOR control port commands (closed: fixed)
  • #22660 defect: Guard against stack smashing attacks in tor with additional compiler ... (needs_revision)
  • #22688 defect: Make sure HSDir3s never know service, client, or bridge IP addresses (needs_revision)
  • #22798 defect: Windows relay is several times slower than Linux relay (needs_review)
  • #22801 defect: Warnings from isnan, isinfinite, signbit on mingw (closed: fixed)
  • #22895 defect: Unused variables in donna's SSE2 header (closed: fixed)
  • #23061 defect: crypto_rand_double() should produce all possible outputs on platforms ... (needs_revision)
  • #23097 defect: The circuit timeout prediction is not working properly (closed: fixed)
  • #23105 defect: Bug: outgoing relay cell sent from src/or/relay.c:836 has n_chan==NULL. (closed: duplicate)
  • #23233 defect: Unexpected BUG violation in hsv3 decriptor decoding (closed: fixed)
  • #23234 defect: Possible problem with bootstrapping logic (Problem bootstrapping. ... (new)
  • #23250 defect: tor-0.3.0.10: test failure on NetBSD (new)
  • #23275 defect: Consensus diffs are generated even if DirCache and DirPort are 0 (closed: fixed)
  • #23318 defect: compute_weighted_bandwidths: do not add 0.5 to final_weight (merge_ready)
  • #23323 defect: sample_laplace_distribution should produce a valid result on 0.0 (assigned)
  • #23414 defect: rep_hist_format_hs_stats() should add noise, then round (needs_revision)
  • #23415 defect: sample_laplace_distribution() should take multiple random inputs (assigned)
  • #23470 defect: Avoid relays resolving their own address on every download status check (closed: fixed)
  • #23487 defect: Incorrect output on bad directory ownership (closed: fixed)
  • #23524 defect: Avoid crashing when we ask for running bridges, but UseBridges is 0 (closed: fixed)
  • #23533 defect: Repair bug in geoip/rephist reporting from relays that only download ... (closed: fixed)
  • #23610 defect: handle_establish_intro() can mark circuits for close twice (closed: fixed)
  • #23681 defect: prop224: Clients mark intro circs as timed-out within seconds (merge_ready)
  • #23690 defect: Assertion *buf_flushlen <= buf->datalen failed (closed: fixed)
  • #23790 defect: rend_service_prune_list_impl_() doesn't copy over desc_is_dirty when ... (merge_ready)
  • #23862 defect: Tor only updates guard state after a consensus if it has enough ... (closed: fixed)
  • #23874 defect: Clear the address when node_get_prim_orport() returns early (closed: fixed)
  • #23985 defect: If less than 15 missing mds, Tor will delay md download for 10 mins (closed: fixed)
  • #23989 defect: entry_guards_update_all() will pretend to update primaries even if ... (accepted)
  • #24043 defect: monotonic time test failure on 0.3.0.x (reopened)
  • #24086 defect: consdiffmgr.c:637: consdiffmgr_find_diff_from: Non-fatal assertion ... (closed: fixed)
  • #24099 defect: tor should remove empty/invalid consensus cache files (Unable to map ... (closed: fixed)
  • #24141 defect: consdiffmgr.c:329: cdm_diff_ht_purge: Non-fatal assertion (closed: duplicate)
  • #24167 defect: connection_check_event: Bug: Event missing on connection (closed: fixed)
  • #24170 defect: Log the actual bandwidth total when logging "Generated weighted bandwidths" (closed: fixed)
  • #24279 defect: configure libevent leaks (closed: fixed)
  • #24367 defect: Changing pluggable transports (during start-up) in Tor Browser is broken (needs_information)
  • #24392 defect: Ignore cached bridge descriptors until we check if they are running (merge_ready)
  • #24394 enhancement: add ipv6 dirauth address (closed: implemented)
  • #24424 defect: fails to build with libseccomp-dev installed on arm64 (closed: fixed)
  • #24633 defect: to->pending->tqh_last is 0xFFFFFFFFFFFFFFFF。 (closed: fixed)
  • #24736 defect: Clear the address when fascist_firewall_choose_address_base() can't ... (closed: fixed)
  • #24769 defect: Increase client idle and connection timeouts to reduce network load (new)
  • #24775 defect: Reduce "Channel padding timeout scheduled" NOTICE messages (new)
  • #24801 enhancement: Generate a new fallback list and backport it (closed: implemented)
  • #24853 enhancement: backport the new authority and fallback file formats (new)
  • #24854 enhancement: Extract the authority list from config.c (new)
  • #24895 defect: MAX_REND_FAILURES is 1, but we will try three times (closed: fixed)
  • #24898 defect: We have two conflicting notions of channel_is_client() (merge_ready)
  • #24902 enhancement: Denial of Service mitigation subsystem (needs_review)