The hidden-service feature in Tor before 0.3.0.8 allows a denial of service (assertion failure and daemon exit) in the connection_edge_process_relay_cell function via a BEGIN_DIR cell on a rendezvous circuit. The hidden-service feature in Tor before 0.3.0.8 allows a denial of service (assertion failure and daemon exit) in the relay_send_end_cell_from_edge_ function via a malformed BEGIN cell.
I just added 0.3.0.8 and it should be good for rapid stabilization: KEYWORDS="amd64 arm ppc ppc64 sparc x86"
@ Arches, please test and mark stable: =net-vpn/tor-0.3.0.8
amd64 stable
x86 stable
ppc64 stable
arm stable
ppc stable
sparc please continue stabilization. GLSA Vote: No New GLSA on Regression in guard family avoidance as depends.
sparc was dropped to exp profile.
@maintainer(s), please cleanup.
(In reply to Aaron Bauman from comment #10) > @maintainer(s), please cleanup. done
(In reply to Anthony Basile from comment #11) > (In reply to Aaron Bauman from comment #10) > > @maintainer(s), please cleanup. > > done Thanks, Doc!