Release Notes: This release fixes two opportunities for remotely-triggerable assertions.
Release Notes: This release fixes a rare race condition which could crash exit relays, fixes a remotely-triggerable crash bug, and fixes a timing attack which could leak path information.
Release Notes: This release introduces a workaround for a critical renegotiation bug in OpenSSL 1.0.1 (20% of the Tor network can't talk to itself currently).
Release Notes: This release fixes a variety of less critical bugs. The main other change is a slight tweak to Tor's TLS handshake.
Release Notes: A remote heap overflow vulnerability that could allow remote code execution was fixed along with other issues.
Release Notes: This release does some code cleanup to reduce the risk of remotely exploitable bugs. The Common Vulnerabilities and Exposures project has assigned CVE-2010-1676 to this issue.
Release Notes: This release makes relays work with OpenSSL 0.9.8p and 1.0.0.b. It fixes several crash bugs, integrates a new directory authority, and updates the bundled GeoIP database.
Release Notes: This release addresses the recent connection and memory overload problems encountered on relays, especially relays with their DirPort open. If your relay has been crashing, or if you turned it off because it used too many resources, this release may help. This release also fixes yet another instance of broken OpenSSL libraries that was causing some relays to drop out of the consensus.
Release Notes: This release fixes a regression introduced in 0.2.1.23 that could prevent relays from guessing their IP address correctly. It also fixes several minor potential security bugs.
Release Notes: This release fixes a huge client-side performance bug, makes Tor work again on the latest Mac OS X, and updates the location of a directory authority.