Changelog for
librelp-devel-1.11.0-150600.16.2.x86_64.rpm :
* Wed Apr 19 2023 thomas.blumeAATTsuse.com- update to librelp 1.11.0 (bsc#1210649) the previous version became incompatible with current rsyslog version 8.2106.0- Important changes per version Version 1.11.0 - 2023-01-10- code cleanup- AIX: Changed ERRNO handling after connect in tcp.c- AIX: Add handling for other ERRNO codes in tcp.c- bugfix/TCP: relpTcpGetRtryDirection onyl needs to check direction if SSL is active.- AIX: in relpTcpRcv we need to set RETRY_recv if errno is 0- openssl: fix openssl exit code avoid double free of ctx- librelp hardening: Fix multiple minor issues causing debugging trouble- OpenSSL: fix depreacted API issues for OpenSSL 3.x- bugfix: compatiblity problem with openssl 1.1- bugfix: Forward return code from relpEngineSetTLSLib to relpEngineSetTLSLibName- bugfix: make relpEngineSetTLSLib debug safe- bugfix: warnings reported by coverity scan- gnutls drvr bugfix: library called exit() under some circumstances Version 1.10.0 - 2021-02-16- TLS handling bugfix Version 1.9.0 - 2020-11-24- openssl bugfix: preprocessor check for tlsconfigcmd code- solaris compatibility fix: add strndup compatibility code Version 1.8.0 - 2020-09-29- gnutls \"bugfix\": handle receives who break connection on close- gnutls bugfix: per-session memory leak- tls bugfix: RETRY not correctly handled in TLS Mode & CI improvement- bugfix: librelp.h contains duplicate function definition- removed some more externally visible symbols not being part of API Version 1.7.0 - 2020-08-25- some internal cleanup (const attributes and such)- bugfix: library did export non-API symbols- openssl: Fix chained certificate files for older OpenSSL Version.- fix FD leak when socket shutdown is one-sided- TLS: Added call to destruct OpenSSL remains to relpEngineDestruct- fix memory leak on session break Version 1.6.0 - 2020-04-21- fix namespace pollution - some non-API functions were exported- replsess: fix double free of sendbuf in some cases.- improve support for libressl- Modified GnuTLS priority according to standard crypto-policy guideline- tcp: Missing pUsr Copy to relpTcp Pointer fixed in relpTcpAcceptConnReq- report io errors for plain tcp connections Version 1.5.0 - 2020-01-14- bugfix: too late termination of relp Engine on shutdown- build system fix: invalid default in configure help text- error message on invalid TLS library request added Version 1.4.0 - 2019-03-05- build system: enable openssl by default, this means both TLS drivers are now build by default- support that both GnuTLS and openssl TLS drivers are active together- portability: use GCC __attribute__ only where supported- bugfix: build problem when HAVE_STRERROR_R is undefined- bugfix: openssl driver did not properly handle retries when sending- bugfix: in openssl mode, cert name validation did not work properly- bugfix: invalid handling of connection fail could lead to abort- a couple of minor and cosmetic nitfixes, improvements and cleanup Version 1.3.0 - 2018-12-11- improved error reporting- bugfix openssl: anon mode did not work with openssl 1.1.0+- bugfix: do not send multiple open commands Version 1.2.18 - 2018-09-18- added non-standard \"certvalid\" auth mode to TLS authentication- bugfix CI: make distcheck did not work Version 1.2.17 - 2018-08-02- added support for openssl- improve code quality: replace strerror() by portable equivalent- improve error message on connection failure- bugfix: 100% CPU utilization due to busy loop- bugfix: do not expose symbols that are not part of public API- bugfix: potential segfault when listener could not be bound Version 1.2.16 - 2018-05-14- API changes
* add new API: relpSrvSetOversizeMode()
* add new API: relpSrvSetLstnAddr()- support additional hashes for fingerprint mode- bugfix: potential memory leak- bugfix: memory leak on protocol error- fixed a couple of minor issues:
* fix memory leak when relp frame construction fails
* removed unnecessary code
* fix memory leak
* fix memory leak on relpSrvRun() error
* fix memory leak on relp listener construction error
* also resolved all other issues reported by Coverity scan
* Sat Mar 24 2018 astiegerAATTsuse.com- librelp 1.2.15:
* CVE-2018-1000140: A remote attackher could have used specially crafted x509 certificates when connecting to rsyslog to trigger a stack buffer overflow and run arbitrary code (bsc#1086730)
* bugfix: invalid handling of snprintf() return code
* bugfix: invalid assert predicate
* some code cleanup
* bugfix: error message on open error was truncated
* Mon May 29 2017 astiegerAATTsuse.com- librelp 1.2.14:
* API extension: add relpSrvSetMaxDataSize()
* Thu Feb 23 2017 astiegerAATTsuse.com- librelp 1.2.13:
* bugfix: duplicated lines after server reconnect
* Mon Jan 30 2017 ndasAATTsuse.com- This updated library is needed for latest rsyslog(fate#320546)
* Sun Jul 10 2016 astiegerAATTsuse.com- librelp 1.2.12:
* API enhancement: permit to set connection timeout
* cleanup: replace deprecated GnuTLS data types by current ones
* Tue Jun 28 2016 astiegerAATTsuse.com- librelp 1.2.11:
* do not accept more than one \"open\" verb on a connection
* fix potential segfault when high-numbered fd is used in sender
* make librelp not run in thight loop when out of sockets
* flush the current recv frame if it exists if the client session is restarting
* API enhancement: add configurable connection timeout
* Mon Apr 04 2016 astiegerAATTsuse.com- librelp 1.2.10:
* fix a problem with sending large buffers
* improve sender/receiver code
* enable compatibility with older versions of GnuTLS
* Mon Feb 08 2016 mpluskalAATTsuse.com- Make building more verbose
* Thu Jan 28 2016 mrueckertAATTsuse.de- fix build on sle11. the sles_version conditional is just broken
* Sat Jan 02 2016 astiegerAATTsuse.com- librelp 1.2.9:
* Ignoring return status when handling syslog frames now. Otherwise valid messages in the frame buffer will get lost when the remote connection is closed during meantime.
* Tue Sep 08 2015 astiegerAATTsuse.com- librelp 1.2.8:
* fix segfault if KEEPALIVE is used