The most important bug fixed in the Tor 0.2.9.9 and Tor 0.3.0.2 Alpha versions is a denial-of-service (DoS) vulnerability that could allow an attacker to crash relays and clients, even if these weren't compiled with the "--enable-expensive-hardening" option. Tor 0.2.9.x and 0.3.0.1-alpha builds are affected by the issue. It is recommended to update to Tor 0.2.9.9, which is the current stable release of the software for enabling anonymous communication, as soon as possible. Also, if you're using the development branch, make sure that you're running at least version 0.3.0.2-alpha, which is now available for download, for testing purposes only.
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.