Release Notes: This release fixes a rare race condition which could crash exit relays, fixes a remotely-triggerable crash bug, and fixes a timing attack which could leak path information.
Release Notes: This release introduces a workaround for a critical renegotiation bug in OpenSSL 1.0.1 (20% of the Tor network can't talk to itself currently).
Release Notes: This release updates the addresses for two of the eight directory authorities, fixes some potential anonymity and security issues, and fixes several crash bugs. Tor 0.2.1.x has reached its end-of-life. Those Tor versions have many known flaws, and nobody should be using them. You should upgrade. If you're using a Linux or BSD distribution and its packages are obsolete, stop using those packages and upgrade anyway.
Release Notes: This release fixes a variety of smaller bugs. The development branch now builds on Windows again.
Release Notes: This release fixes yet more bugs to get closer to a release candidate. It also dramatically speeds up AES: fast relays should consider switching to the newer OpenSSL library.
Release Notes: This release lets fast exit relays scale better, allows clients to use bridges that run Tor 0.2.2.x, and resolves several big bugs when Tor is configured to use a pluggable transport like obfsproxy.
Release Notes: This release fixes a critical heap overflow security issue in Tor's buffers code. Absolutely everybody should upgrade. The bug relied on an incorrect calculation when making data continuous in one of the IO buffers, if the first chunk of the buffer was misaligned by just the wrong amount. The miscalculation would allow an attacker to overflow a piece of heap-allocated memory.
Release Notes: This release fixes some crash and assert bugs, including a socketpair-related bug which has been bothering Windows users. It adds support to serve microdescriptors to controllers, so Vidalia's network map can resume listing relays (once Vidalia implements its side) and adds better support for hardware AES acceleration. Finally, it starts the process of adjusting the bandwidth cutoff for getting the "Fast" flag from 20KB to (currently) 32KB. Preliminary results show that tiny relays harm performance more than they help network capacity.
Release Notes: This release fixes several bugs and includes a slight tweak to Tor's TLS handshake which makes relays and bridges which run this new version reachable from Iran again.
Release Notes: This release adds a new "stream isolation" feature to improve Tor's security, and provides client-side support for the microdescriptor and optimistic data features introduced earlier in the 0.2.3.x series. It also includes numerous critical bugfixes in the (optional) bufferevent-based networking backend.