Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with '031-backport'

  • #3940 defect: Allow MapAddress .exit even if AllowDotExit is 0 (closed: worksforme)
  • #6767 defect: tor crashes with Assertion smartlist_get(rl->old_routers, idx) == sd failed (closed: worksforme)
  • #8185 defect: circuit_package_relay_cell(): Bug: outgoing relay cell has ... (closed: fixed)
  • #15582 defect: compile warning in test_util.c: In function 'test_util_sscanf' (closed: fixed)
  • #18859 defect: A new SOCKS connection should use a pre-built circuit for its first stream (closed: fixed)
  • #19760 defect: Update longclaw's hard-coded IPv6 address (closed: implemented)
  • #20532 defect: Make sure directory_initiate_request handles pluggable transports correctly (closed: fixed)
  • #21074 defect: setrlimit fails OSX Sierra (closed: fixed)
  • #22563 defect: Many memory pages in tor.exe for Windows violate WX (closed: fixed)
  • #22605 defect: sandbox_intern_string(): Bug: No interned sandbox parameter found for ... (closed: fixed)
  • #22644 defect: Assert crash with HSPOST and POSTDESCRIPTOR control port commands (closed: fixed)
  • #22801 defect: Warnings from isnan, isinfinite, signbit on mingw (closed: fixed)
  • #22895 defect: Unused variables in donna's SSE2 header (closed: fixed)
  • #23097 defect: The circuit timeout prediction is not working properly (closed: fixed)
  • #23105 defect: Bug: outgoing relay cell sent from src/or/relay.c:836 has n_chan==NULL. (closed: duplicate)
  • #23233 defect: Unexpected BUG violation in hsv3 decriptor decoding (closed: fixed)
  • #23234 defect: Possible problem with bootstrapping logic (Problem bootstrapping. ... (closed: duplicate)
  • #23275 defect: Consensus diffs are generated even if DirCache and DirPort are 0 (closed: fixed)
  • #23318 defect: compute_weighted_bandwidths: do not add 0.5 to final_weight (closed: fixed)
  • #23470 defect: Avoid relays resolving their own address on every download status check (closed: fixed)
  • #23487 defect: Incorrect output on bad directory ownership (closed: fixed)
  • #23524 defect: Avoid crashing when we ask for running bridges, but UseBridges is 0 (closed: fixed)
  • #23533 defect: Repair bug in geoip/rephist reporting from relays that only download ... (closed: fixed)
  • #23610 defect: handle_establish_intro() can mark circuits for close twice (closed: fixed)
  • #23690 defect: Assertion *buf_flushlen <= buf->datalen failed (closed: fixed)
  • #23693 defect: 0.3.1.7: Assertion threadpool failed in cpuworker_queue_work (closed: fixed)
  • #23706 defect: Tor's seccomp sandbox does not know about the syscall epoll_pwait (closed: fixed)
  • #23862 defect: Tor only updates guard state after a consensus if it has enough ... (closed: fixed)
  • #23874 defect: Clear the address when node_get_prim_orport() returns early (closed: fixed)
  • #23985 defect: If less than 15 missing mds, Tor will delay md download for 10 mins (closed: fixed)
  • #23989 defect: entry_guards_update_all() will pretend to update primaries even if ... (closed: fixed)
  • #24086 defect: consdiffmgr.c:637: consdiffmgr_find_diff_from: Non-fatal assertion ... (closed: fixed)
  • #24099 defect: tor should remove empty/invalid consensus cache files (Unable to map ... (closed: fixed)
  • #24141 defect: consdiffmgr.c:329: cdm_diff_ht_purge: Non-fatal assertion (closed: duplicate)
  • #24167 defect: connection_check_event: Bug: Event missing on connection (closed: fixed)
  • #24170 defect: Log the actual bandwidth total when logging "Generated weighted bandwidths" (closed: fixed)
  • #24198 defect: (Sandbox) Caught a bad syscall attempt (syscall kill) (closed: fixed)
  • #24279 defect: configure libevent leaks (closed: fixed)
  • #24315 defect: sandbox incompatible with glibc 2.26 (openat() not handled for all our ... (closed: fixed)
  • #24392 defect: Ignore cached bridge descriptors until we check if they are running (closed: fixed)
  • #24394 enhancement: add ipv6 dirauth address (closed: implemented)
  • #24424 defect: fails to build with libseccomp-dev installed on arm64 (closed: fixed)
  • #24633 defect: to->pending->tqh_last is 0xFFFFFFFFFFFFFFFF。 (closed: fixed)
  • #24736 defect: Clear the address when fascist_firewall_choose_address_base() can't ... (closed: fixed)
  • #24769 defect: Increase client idle and connection timeouts to reduce network load (closed: implemented)
  • #24775 defect: Reduce "Channel padding timeout scheduled" NOTICE messages (closed: duplicate)
  • #24801 enhancement: Generate a new fallback list and backport it (closed: implemented)
  • #24854 enhancement: Extract the authority list from config.c (closed: implemented)
  • #24859 defect: Bug: Non-fatal assertion !(ent == NULL) failed in store_multiple at ... (closed: fixed)
  • #24891 defect: build system --disable-unittests has no effect (closed: fixed)
  • #24895 defect: MAX_REND_FAILURES is 1, but we will try three times (closed: fixed)
  • #24898 defect: We have two conflicting notions of channel_is_client() (closed: fixed)
  • #24902 enhancement: Denial of Service mitigation subsystem (closed: fixed)
  • #24969 defect: Allow sleep() in the sandbox (closed: fixed)
  • #24978 defect: Tor doesn't work when built with (unreleased) OpenSSL 1.1.1 built with ... (closed: implemented)
  • #25070 defect: protover_get_supported_protocols() should include Link=5 as of ... (closed: fixed)
  • #25122 enhancement: geoip: Hook the client geoip cache into the OOM handler (closed: implemented)
  • #25174 enhancement: Update to February GeoIP2 database (closed: implemented)
  • #25183 defect: Implement a way to tell if an IP address is a known relay (closed: fixed)
  • #25193 defect: dos: Avoid blacklisting Exit relays (closed: fixed)
  • #25313 defect: Sandbox: Caught a bad syscall attempt (syscall poll) (closed: fixed)
  • #25450 defect: Intermittent test failures for hs_service/service_intro_point (closed: fixed)
  • #25469 enhancement: Update to March GeoIP2 database (closed: implemented)
  • #25617 defect: unable to resolve DNS requests from control port, regression (closed: fixed)
  • #25629 defect: fix CID 1430932 (closed: fixed)
  • #25718 enhancement: Update to April GeoIP2 database (closed: implemented)
  • #25818 enhancement: Investigate using coveralls with travis (closed: implemented)
  • #25912 defect: CID 1435130: Incorrect expression (COPY_PASTE_ERROR) (closed: fixed)
  • #25936 defect: have travis display test-suite.log from the right place when DISTCHECK=yes (closed: fixed)
  • #25960 enhancement: Allow additional header lines in bandwidth measurements documents (closed: fixed)
  • #26006 defect: LibreSSL compilation warnings on all supported Tor versions (closed: fixed)
  • #26007 defect: Stop logging stack contents when reading a zero-length bandwidth file (closed: fixed)
  • #26069 defect: hs-v3: Descriptor signature parsing should have a trailing white-space (closed: fixed)
  • #26072 defect: Malformed connected cell closes connection but code continues (closed: fixed)
  • #26104 enhancement: Update to May GeoIP2 database (closed: implemented)
  • #26116 defect: OpenSSL 1.1.1 changed the semantics of the password callback return value (closed: fixed)
  • #26158 defect: A little bug of circular path of Tor (closed: fixed)
  • #26196 defect: Abort in test_bridges.c (closed: fixed)
  • #26202 defect: Packaged apparmor settings break tor within LXD containers (closed: invalid)
  • #26272 defect: gcc 7 fails on -Wunused-const-variable for Zstd headers (closed: fixed)
  • #26351 enhancement: Update to June GeoIP2 database (closed: implemented)
  • #26388 task: Update tor copyright headers to year 2018 (closed: implemented)