Commit ea5a9562 authored by Tails developers's avatar Tails developers
Browse files

Merge the 1.1~{beta1,rc1} changelogs into 1.1's.

parent b2f24427
tails (1.1) unstable; urgency=medium
* Security fixes
- Upgrade the web browser to 24.7.0esr-0+tails1~bpo70+1
(Firefox 24.7.0esr + Iceweasel patches + Torbrowser patches).
- Upgrade to Linux 3.14.12-1 (fixes CVE-2014-4699).
- Upgrade libav-based packages to 0.8.13-1 (fixes CVE-2014-4609).
- Upgrade to libxml2 2.8.0+dfsg1-7+wheezy1 (fixes CVE-2014-0191).
- Upgrade to dbus 1.6.8-1+deb7u3 (fixes CVE-2014-3477,
CVE-2014-3532 and CVE-2014-3533).
* Bugfixes
- Remove Unsafe Browser bookmarks from the default system-wide
profile skeleton too (Closes #7594).
* Minor improvements
- Fix quick search in Tails Greeter's Other languages window
(Closes: #5387
* Automated test suite
- Use OpenJDK 7 to run our test suite (Closes #7175).
- Use qemu-system-x86_64 directly, instead of kvm, for running the
automated test suite (Closes: #7605).
-- Tails developers <tails@boum.org> Sun, 20 Jul 2014 23:16:13 +0200
* Rebase on Debian Wheezy
- Upgrade literally thousands of packages.
- Migrate to GNOME3 fallback mode.
- Install LibreOffice instead of OpenOffice.
- Install systemd. It is not enabled by default, but having it
around will help doing the migration work.
- Enable AppArmor on the kernel command-line. This is a no-op
without the userspace tools and with no profile shipped, but it
will make it easier to fix this part of the situation.
- Remove custom LSB logging: Wheezy has fancy colored init
logging.
tails (1.1~rc1) unstable; urgency=medium
* Major new features
- Replace the Windows XP camouflage with an experimental Windows 8
camouflage.
- UEFI boot support.
- Install Linux 3.14 from Debian unstable.
- Bring back VirtualBox guest modules, installed from Wheezy
backports. Full functionality is only available when using the
32-bit kernel.
* Security fixes
- Upgrade Tor to 0.2.4.22.
- Fix write access to boot medium via udisks (#6172).
- Don't allow the desktop user to pass arguments to
tails-upgrade-frontend (Closes: #7410).
- Make persistent file permissions safer (Closes #7443):
......@@ -55,6 +52,13 @@ tails (1.1~rc1) unstable; urgency=medium
proxying will be dealt with safely by our firewall, this could
be used to defeat stream isolation, although the user must be
tricked into accepting the new proxy settings.
- Upgrade the web browser to 24.7.0esr-0+tails1~bpo70+1
(Firefox 24.7.0esr + Iceweasel patches + Torbrowser patches).
- Upgrade to Linux 3.14.12-1 (fixes CVE-2014-4699).
- Upgrade libav-based packages to 0.8.13-1 (fixes CVE-2014-4609).
- Upgrade to libxml2 2.8.0+dfsg1-7+wheezy1 (fixes CVE-2014-0191).
- Upgrade to dbus 1.6.8-1+deb7u3 (fixes CVE-2014-3477,
CVE-2014-3532 and CVE-2014-3533).
* Bugfixes
- Disable GNOME keyring's GnuPG functionality. (Closes: #7330) In
......@@ -80,106 +84,8 @@ tails (1.1~rc1) unstable; urgency=medium
when the old one was, but disable the old one (Closes: #7338).
- The Unsafe Web Browser can now be started while the Windows 8
camouflage feature is activated (Closes: #7329).
* Minor improvements
- Various improvements to the Windows 8 camouflage:
* Set iceweasel and pidgin camouflage icons.
* Set claws-mail application icon.
* Set florence tray icon.
* Set gpgApplet tray icon.
* Set volume tray icon.
* Configure Iceweasel camouflage.
* Remove launchers (Closes #7381).
* Make the Unsafe Browser use the Windows 8 camouflage.
- Also install linux-base and linux-compiler-gcc-4.8-x86 from
sid. This way, we can get rid of our linux-compiler-gcc-4.8-x86
3.12, and it makes things a bit more consistent.
- Include the syslinux binary, and its MBR, in the ISO filesystem.
This in turn allows Tails Installer to use this binary and MBR,
which is critical for avoiding problems (such as #7345) on
"Upgrade from ISO".
- Include syslinux.exe for win32 in utils/win32/ on the ISO
filesystem (Closes: #7425).
- Tails Installer:
* Increase font size (Closes: #5673).
* Add consistent marigins in GUI.
* Always reset the target drive's MBR, without asking for
confirmation, after installing or upgrading.
* Install the bootloader using the syslinux binary found on the
target device, once the Live OS has been extracted/copied
there.
- Enable double-clicking to pick entries in the language or
keyboard layout lists in Tails Greeter.
- Install backport of shared-mime-info 1.3 (Closes: #7079).
- Make sanity-check prompts closable in Tails Persistence Setup
(Closes: #7119.
* Automated test suite
- Actually run "Upgrade from ISO" from a USB drive running the old
version. That's what users do, and is buggy.
- Automatically test persistent directories permissions (Closes: #7560).
- Use read-write persistence when testing upgraded USB
installations. Otherwise e.g. the permission fixes won't get
applied, and the subsequent steps testing the permissions will
fail.
- Actually check that the ISO's Tails is installed. The step
"Tails is installed on USB drive $TARGET" only checks that the
*running* Tails is installed on $TARGET, which obviously fails
when doing an upgrade from ISO running an old Tails. That it
worked for the same scenario running the current Tails is just
coincidental.
-- Tails developers <tails@boum.org> Wed, 02 Jul 2014 03:11:43 +0200
tails (1.0.1) unstable; urgency=medium
* Security fixes
- Upgrade the web browser to 24.6.0esr-0+tails1~bpo60+1
(Firefox 24.6.0esr + Iceweasel patches + Torbrowser patches).
Also import the Tor Browser profile at commit
90ba8fbaf6f23494f1a0e38d63153b3b7e65d3d3 from
ttp/tor-browser-24.6.0esr-3.x-1.
- Install Linux 3.14 from Debian unstable (fixes CVE-2014-3153 and
others).
- Install openssl from Squeeze LTS (fixes CVE-2014-0076,
CVE-2014-0195, CVE-2014-0221, CVE-2014-3470 and CVE-2014-0224).
- Install GnuTLS from Squeeze LTS (fixes CVE-2014-3466.).
* Minor improvements
- Add Squeeze LTS APT sources. It has been given a low pinning
priority so explicit pinning must be used to actually install
anything from it.
- Upgrade Tor to 0.2.4.22-1~d60.squeeze+1.
- Upgrade I2P to 0.9.13-1~deb6u+1.
-- Tails developers <tails@boum.org> Sun, 08 Jun 2014 19:14:00 +0200
tails (1.1~beta1) unstable; urgency=medium
* Rebase on Debian Wheezy
- Upgrade literally thousands of packages.
- Migrate to GNOME3 fallback mode.
- Install LibreOffice instead of OpenOffice.
- Install systemd. It is not enabled by default, but having it
around will help doing the migration work.
- Enable AppArmor on the kernel command-line. This is a no-op
without the userspace tools and with no profile shipped, but it
will make it easier to fix this part of the situation.
- Remove custom LSB logging: Wheezy has fancy colored init
logging.
* Security fixes
- Upgrade Tor to 0.2.4.22.
- Fix write access to boot medium via udisks (#6172).
* Major new features
- Replace the Windows XP camouflage with an experimental Windows 8
camouflage.
- UEFI boot support.
- Install Linux 3.14 from Debian unstable.
- Bring back VirtualBox guest modules, installed from Wheezy
backports. Full functionality is only available when using the
32-bit kernel.
- Remove Unsafe Browser bookmarks from the default system-wide
profile skeleton too (Closes #7594).
* Minor improvements
- Install seahorse-nautilus, replacing seahorse-plugins (Closes #5516).
......@@ -213,6 +119,39 @@ tails (1.1~beta1) unstable; urgency=medium
DMI data, IPv6 addresses, and serial numbers (Closes #6797,
#6798, #6804).
- Integrate the new logo in Tails Installer (Closes #7095)
- Various improvements to the Windows 8 camouflage:
* Set iceweasel and pidgin camouflage icons.
* Set claws-mail application icon.
* Set florence tray icon.
* Set gpgApplet tray icon.
* Set volume tray icon.
* Configure Iceweasel camouflage.
* Remove launchers (Closes #7381).
* Make the Unsafe Browser use the Windows 8 camouflage.
- Also install linux-base and linux-compiler-gcc-4.8-x86 from
sid. This way, we can get rid of our linux-compiler-gcc-4.8-x86
3.12, and it makes things a bit more consistent.
- Include the syslinux binary, and its MBR, in the ISO filesystem.
This in turn allows Tails Installer to use this binary and MBR,
which is critical for avoiding problems (such as #7345) on
"Upgrade from ISO".
- Include syslinux.exe for win32 in utils/win32/ on the ISO
filesystem (Closes: #7425).
- Tails Installer:
* Increase font size (Closes: #5673).
* Add consistent marigins in GUI.
* Always reset the target drive's MBR, without asking for
confirmation, after installing or upgrading.
* Install the bootloader using the syslinux binary found on the
target device, once the Live OS has been extracted/copied
there.
- Enable double-clicking to pick entries in the language or
keyboard layout lists in Tails Greeter.
- Install backport of shared-mime-info 1.3 (Closes: #7079).
- Make sanity-check prompts closable in Tails Persistence Setup
(Closes: #7119.
- Fix quick search in Tails Greeter's Other languages window
(Closes: #5387
* Build system
- Bump Vagrant builder's memory for RAM builds. Wheezy requires
......@@ -235,7 +174,7 @@ tails (1.1~beta1) unstable; urgency=medium
we always checked the host, which doesn't make sense when the VM
is already started.
* Test suite
* Automated test suite
- Bump the tester VM's RAM by 256 MiB. There is not enough free
RAM to run Tails Upgrader with just 1 GiB of RAM after the
migration to Wheezy.
......@@ -245,8 +184,47 @@ tails (1.1~beta1) unstable; urgency=medium
- Add option to make Sikuli rety on FindFailed. This makes it
possible to update manu images for Sikuli in just *one* test
suite run, by continuously updating outdated pictures as we go.
- Actually run "Upgrade from ISO" from a USB drive running the old
version. That's what users do, and is buggy.
- Automatically test persistent directories permissions (Closes: #7560).
- Use read-write persistence when testing upgraded USB
installations. Otherwise e.g. the permission fixes won't get
applied, and the subsequent steps testing the permissions will
fail.
- Actually check that the ISO's Tails is installed. The step
"Tails is installed on USB drive $TARGET" only checks that the
*running* Tails is installed on $TARGET, which obviously fails
when doing an upgrade from ISO running an old Tails. That it
worked for the same scenario running the current Tails is just
coincidental.
- Use OpenJDK 7 to run our test suite (Closes #7175).
- Use qemu-system-x86_64 directly, instead of kvm, for running the
automated test suite (Closes: #7605).
-- Tails developers <tails@boum.org> Thu, 29 May 2014 00:23:52 +0200
-- Tails developers <tails@boum.org> Sun, 20 Jul 2014 23:16:13 +0200
tails (1.0.1) unstable; urgency=medium
* Security fixes
- Upgrade the web browser to 24.6.0esr-0+tails1~bpo60+1
(Firefox 24.6.0esr + Iceweasel patches + Torbrowser patches).
Also import the Tor Browser profile at commit
90ba8fbaf6f23494f1a0e38d63153b3b7e65d3d3 from
ttp/tor-browser-24.6.0esr-3.x-1.
- Install Linux 3.14 from Debian unstable (fixes CVE-2014-3153 and
others).
- Install openssl from Squeeze LTS (fixes CVE-2014-0076,
CVE-2014-0195, CVE-2014-0221, CVE-2014-3470 and CVE-2014-0224).
- Install GnuTLS from Squeeze LTS (fixes CVE-2014-3466.).
* Minor improvements
- Add Squeeze LTS APT sources. It has been given a low pinning
priority so explicit pinning must be used to actually install
anything from it.
- Upgrade Tor to 0.2.4.22-1~d60.squeeze+1.
- Upgrade I2P to 0.9.13-1~deb6u+1.
-- Tails developers <tails@boum.org> Sun, 08 Jun 2014 19:14:00 +0200
tails (1.0) unstable; urgency=medium
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment