Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: librelp0 | Distribution: SUSE Linux Enterprise 15 |
Version: 1.11.0 | Vendor: SUSE LLC <https://www.suse.com/> |
Release: 150600.16.2 | Build date: Fri Mar 8 20:54:02 2024 |
Group: Development/Libraries/C and C++ | Build host: h02-armsrv1 |
Size: 132960 | Source RPM: librelp-1.11.0-150600.16.2.src.rpm |
Packager: https://www.suse.com/ | |
Url: http://www.librelp.com/ | |
Summary: A reliable logging library |
librelp is an easy to use library for the RELP protocol. RELP in turn provides reliable event logging over the network (and consequently RELP stands for Reliable Event Logging Protocol). RELP was initiated by Rainer Gerhards after he was finally upset by the lossy nature of plain tcp syslog and wanted a cure for all these dangling issues. RELP (and hence) librelp assures that no message is lost, not even when connections break and a peer becomes unavailable. The current version of RELP has a minimal window of opportunity for message duplication after a session has been broken due to network problems. In this case, a few messages may be duplicated (a problem that also exists with plain tcp syslog). Future versions of RELP will address this shortcoming. Please note that RELP is a general-purpose, extensible logging protocol. Even though it was designed to solve the urgent need of rsyslog-to-rsyslog communication, RELP supports many more applications. Extensible command verbs provide ample opportunity to extend the protocol without affecting existing applications.
GPL-3.0+
* Wed Apr 19 2023 thomas.blume@suse.com - update to librelp 1.11.0 (bsc#1210649) the previous version became incompatible with current rsyslog version 8.2106.0 - Important changes per version Version 1.11.0 - 2023-01-10 - code cleanup - AIX: Changed ERRNO handling after connect in tcp.c - AIX: Add handling for other ERRNO codes in tcp.c - bugfix/TCP: relpTcpGetRtryDirection onyl needs to check direction if SSL is active. - AIX: in relpTcpRcv we need to set RETRY_recv if errno is 0 - openssl: fix openssl exit code avoid double free of ctx - librelp hardening: Fix multiple minor issues causing debugging trouble - OpenSSL: fix depreacted API issues for OpenSSL 3.x - bugfix: compatiblity problem with openssl 1.1 - bugfix: Forward return code from relpEngineSetTLSLib to relpEngineSetTLSLibName - bugfix: make relpEngineSetTLSLib debug safe - bugfix: warnings reported by coverity scan - gnutls drvr bugfix: library called exit() under some circumstances Version 1.10.0 - 2021-02-16 - TLS handling bugfix Version 1.9.0 - 2020-11-24 - openssl bugfix: preprocessor check for tlsconfigcmd code - solaris compatibility fix: add strndup compatibility code Version 1.8.0 - 2020-09-29 - gnutls "bugfix": handle receives who break connection on close - gnutls bugfix: per-session memory leak - tls bugfix: RETRY not correctly handled in TLS Mode & CI improvement - bugfix: librelp.h contains duplicate function definition - removed some more externally visible symbols not being part of API Version 1.7.0 - 2020-08-25 - some internal cleanup (const attributes and such) - bugfix: library did export non-API symbols - openssl: Fix chained certificate files for older OpenSSL Version. - fix FD leak when socket shutdown is one-sided - TLS: Added call to destruct OpenSSL remains to relpEngineDestruct - fix memory leak on session break Version 1.6.0 - 2020-04-21 - fix namespace pollution - some non-API functions were exported - replsess: fix double free of sendbuf in some cases. - improve support for libressl - Modified GnuTLS priority according to standard crypto-policy guideline - tcp: Missing pUsr Copy to relpTcp Pointer fixed in relpTcpAcceptConnReq - report io errors for plain tcp connections Version 1.5.0 - 2020-01-14 - bugfix: too late termination of relp Engine on shutdown - build system fix: invalid default in configure help text - error message on invalid TLS library request added Version 1.4.0 - 2019-03-05 - build system: enable openssl by default, this means both TLS drivers are now build by default - support that both GnuTLS and openssl TLS drivers are active together - portability: use GCC __attribute__ only where supported - bugfix: build problem when HAVE_STRERROR_R is undefined - bugfix: openssl driver did not properly handle retries when sending - bugfix: in openssl mode, cert name validation did not work properly - bugfix: invalid handling of connection fail could lead to abort - a couple of minor and cosmetic nitfixes, improvements and cleanup Version 1.3.0 - 2018-12-11 - improved error reporting - bugfix openssl: anon mode did not work with openssl 1.1.0+ - bugfix: do not send multiple open commands Version 1.2.18 - 2018-09-18 - added non-standard "certvalid" auth mode to TLS authentication - bugfix CI: make distcheck did not work Version 1.2.17 - 2018-08-02 - added support for openssl - improve code quality: replace strerror() by portable equivalent - improve error message on connection failure - bugfix: 100% CPU utilization due to busy loop - bugfix: do not expose symbols that are not part of public API - bugfix: potential segfault when listener could not be bound Version 1.2.16 - 2018-05-14 - API changes * add new API: relpSrvSetOversizeMode() * add new API: relpSrvSetLstnAddr() - support additional hashes for fingerprint mode - bugfix: potential memory leak - bugfix: memory leak on protocol error - fixed a couple of minor issues: * fix memory leak when relp frame construction fails * removed unnecessary code * fix memory leak * fix memory leak on relpSrvRun() error * fix memory leak on relp listener construction error * also resolved all other issues reported by Coverity scan * Sat Mar 24 2018 astieger@suse.com - librelp 1.2.15: * CVE-2018-1000140: A remote attackher could have used specially crafted x509 certificates when connecting to rsyslog to trigger a stack buffer overflow and run arbitrary code (bsc#1086730) * bugfix: invalid handling of snprintf() return code * bugfix: invalid assert predicate * some code cleanup * bugfix: error message on open error was truncated * Mon May 29 2017 astieger@suse.com - librelp 1.2.14: * API extension: add relpSrvSetMaxDataSize() * Thu Feb 23 2017 astieger@suse.com - librelp 1.2.13: * bugfix: duplicated lines after server reconnect * Mon Jan 30 2017 ndas@suse.com - This updated library is needed for latest rsyslog(fate#320546) * Sun Jul 10 2016 astieger@suse.com - librelp 1.2.12: * API enhancement: permit to set connection timeout * cleanup: replace deprecated GnuTLS data types by current ones * Tue Jun 28 2016 astieger@suse.com - librelp 1.2.11: * do not accept more than one "open" verb on a connection * fix potential segfault when high-numbered fd is used in sender * make librelp not run in thight loop when out of sockets * flush the current recv frame if it exists if the client session is restarting * API enhancement: add configurable connection timeout * Mon Apr 04 2016 astieger@suse.com - librelp 1.2.10: * fix a problem with sending large buffers * improve sender/receiver code * enable compatibility with older versions of GnuTLS * Mon Feb 08 2016 mpluskal@suse.com - Make building more verbose * Thu Jan 28 2016 mrueckert@suse.de - fix build on sle11. the sles_version conditional is just broken * Sat Jan 02 2016 astieger@suse.com - librelp 1.2.9: * Ignoring return status when handling syslog frames now. Otherwise valid messages in the frame buffer will get lost when the remote connection is closed during meantime. * Tue Sep 08 2015 astieger@suse.com - librelp 1.2.8: * fix segfault if KEEPALIVE is used
/usr/lib64/librelp.so.0 /usr/lib64/librelp.so.0.5.1
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 20:14:19 2024