Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

librelp-devel-1.11.0-150600.16.2 RPM for x86_64

From OpenSuSE Leap 15.6 for x86_64

Name: librelp-devel Distribution: SUSE Linux Enterprise 15
Version: 1.11.0 Vendor: SUSE LLC <https://www.suse.com/>
Release: 150600.16.2 Build date: Fri Mar 8 21:19:23 2024
Group: Development/Libraries/C and C++ Build host: h04-ch1b
Size: 128439 Source RPM: librelp-1.11.0-150600.16.2.src.rpm
Packager: https://www.suse.com/
Url: http://www.librelp.com/
Summary: A reliable logging library
librelp is an easy to use library for the RELP protocol. RELP in turn provides
reliable event logging over the network (and consequently RELP stands for
Reliable Event Logging Protocol). RELP was initiated by Rainer Gerhards after
he was finally upset by the lossy nature of plain tcp syslog and wanted a cure
for all these dangling issues.

RELP (and hence) librelp assures that no message is lost, not even when
connections break and a peer becomes unavailable. The current version of RELP
has a minimal window of opportunity for message duplication after a session has
been broken due to network problems. In this case, a few messages may be
duplicated (a problem that also exists with plain tcp syslog). Future versions
of RELP will address this shortcoming.

Please note that RELP is a general-purpose, extensible logging protocol. Even
though it was designed to solve the urgent need of rsyslog-to-rsyslog
communication, RELP supports many more applications. Extensible command verbs
provide ample opportunity to extend the protocol without affecting existing
applications.

Provides

Requires

License

GPL-3.0+

Changelog

* Wed Apr 19 2023 thomas.blume@suse.com
  - update to librelp 1.11.0 (bsc#1210649)
    the previous version became incompatible with current rsyslog
    version 8.2106.0
  - Important changes per version
    Version 1.11.0 - 2023-01-10
  - code cleanup
  - AIX: Changed ERRNO handling after connect in tcp.c
  - AIX: Add handling for other ERRNO codes in tcp.c
  - bugfix/TCP: relpTcpGetRtryDirection onyl needs to check direction if SSL is active.
  - AIX: in relpTcpRcv we need to set RETRY_recv if errno is 0
  - openssl: fix openssl exit code avoid double free of ctx
  - librelp hardening: Fix multiple minor issues causing debugging trouble
  - OpenSSL: fix depreacted API issues for OpenSSL 3.x
  - bugfix: compatiblity problem with openssl 1.1
  - bugfix: Forward return code from relpEngineSetTLSLib to relpEngineSetTLSLibName
  - bugfix: make relpEngineSetTLSLib debug safe
  - bugfix: warnings reported by coverity scan
  - gnutls drvr bugfix: library called exit() under some circumstances
    Version 1.10.0 - 2021-02-16
  - TLS handling bugfix
    Version 1.9.0 - 2020-11-24
  - openssl bugfix: preprocessor check for tlsconfigcmd code
  - solaris compatibility fix: add strndup compatibility code
    Version 1.8.0 - 2020-09-29
  - gnutls "bugfix": handle receives who break connection on close
  - gnutls bugfix: per-session memory leak
  - tls bugfix: RETRY not correctly handled in TLS Mode & CI improvement
  - bugfix: librelp.h contains duplicate function definition
  - removed some more externally visible symbols not being part of API
    Version 1.7.0 - 2020-08-25
  - some internal cleanup (const attributes and such)
  - bugfix: library did export non-API symbols
  - openssl: Fix chained certificate files for older OpenSSL Version.
  - fix FD leak when socket shutdown is one-sided
  - TLS: Added call to destruct OpenSSL remains to relpEngineDestruct
  - fix memory leak on session break
    Version 1.6.0 - 2020-04-21
  - fix namespace pollution - some non-API functions were exported
  - replsess: fix double free of sendbuf in some cases.
  - improve support for libressl
  - Modified GnuTLS priority according to standard crypto-policy guideline
  - tcp: Missing pUsr Copy to relpTcp Pointer fixed in relpTcpAcceptConnReq
  - report io errors for plain tcp connections
    Version 1.5.0 - 2020-01-14
  - bugfix: too late termination of relp Engine on shutdown
  - build system fix: invalid default in configure help text
  - error message on invalid TLS library request added
    Version 1.4.0 - 2019-03-05
  - build system: enable openssl by default, this means both TLS drivers
    are now build by default
  - support that both GnuTLS and openssl TLS drivers are active together
  - portability: use GCC __attribute__ only where supported
  - bugfix: build problem when HAVE_STRERROR_R is undefined
  - bugfix: openssl driver did not properly handle retries when sending
  - bugfix: in openssl mode, cert name validation did not work properly
  - bugfix: invalid handling of connection fail could lead to abort
  - a couple of minor and cosmetic nitfixes, improvements and cleanup
    Version 1.3.0 - 2018-12-11
  - improved error reporting
  - bugfix openssl: anon mode did not work with openssl 1.1.0+
  - bugfix: do not send multiple open commands
    Version 1.2.18 - 2018-09-18
  - added non-standard "certvalid" auth mode to TLS authentication
  - bugfix CI: make distcheck did not work
    Version 1.2.17 - 2018-08-02
  - added support for openssl
  - improve code quality: replace strerror() by portable equivalent
  - improve error message on connection failure
  - bugfix: 100% CPU utilization due to busy loop
  - bugfix: do not expose symbols that are not part of public API
  - bugfix: potential segfault when listener could not be bound
    Version 1.2.16 - 2018-05-14
  - API changes
    * add new API: relpSrvSetOversizeMode()
    * add new API: relpSrvSetLstnAddr()
  - support additional hashes for fingerprint mode
  - bugfix: potential memory leak
  - bugfix: memory leak on protocol error
  - fixed a couple of minor issues:
    * fix memory leak when relp frame construction fails
    * removed unnecessary code
    * fix memory leak
    * fix memory leak on relpSrvRun() error
    * fix memory leak on relp listener construction error
    * also resolved all other issues reported by Coverity scan
* Sat Mar 24 2018 astieger@suse.com
  - librelp 1.2.15:
    * CVE-2018-1000140: A remote attackher could have used specially
      crafted x509 certificates when connecting to rsyslog to trigger
      a stack buffer overflow and run arbitrary code (bsc#1086730)
    * bugfix: invalid handling of snprintf() return code
    * bugfix: invalid assert predicate
    * some code cleanup
    * bugfix: error message on open error was truncated
* Mon May 29 2017 astieger@suse.com
  - librelp 1.2.14:
    * API extension: add relpSrvSetMaxDataSize()
* Thu Feb 23 2017 astieger@suse.com
  - librelp 1.2.13:
    * bugfix: duplicated lines after server reconnect
* Mon Jan 30 2017 ndas@suse.com
  - This updated library is needed for latest rsyslog(fate#320546)
* Sun Jul 10 2016 astieger@suse.com
  - librelp 1.2.12:
    * API enhancement: permit to set connection timeout
    * cleanup: replace deprecated GnuTLS data types by current ones
* Tue Jun 28 2016 astieger@suse.com
  - librelp 1.2.11:
    * do not accept more than one "open" verb on a connection
    * fix potential segfault when high-numbered fd is used in sender
    * make librelp not run in thight loop when out of sockets
    * flush the current recv frame if it exists if the client session
      is restarting
    * API enhancement: add configurable connection timeout
* Mon Apr 04 2016 astieger@suse.com
  - librelp 1.2.10:
    * fix a problem with sending large buffers
    * improve sender/receiver code
    * enable compatibility with older versions of GnuTLS
* Mon Feb 08 2016 mpluskal@suse.com
  - Make building more verbose
* Thu Jan 28 2016 mrueckert@suse.de
  - fix build on sle11. the sles_version conditional is just broken
* Sat Jan 02 2016 astieger@suse.com
  - librelp 1.2.9:
    * Ignoring return status when handling syslog frames now.
      Otherwise valid messages in the frame buffer will get lost when
      the remote connection is closed during meantime.
* Tue Sep 08 2015 astieger@suse.com
  - librelp 1.2.8:
    * fix segfault if KEEPALIVE is used

Files

/usr/include/librelp.h
/usr/lib64/librelp.so
/usr/lib64/pkgconfig/relp.pc
/usr/share/doc/packages/librelp-devel
/usr/share/doc/packages/librelp-devel/AUTHORS
/usr/share/doc/packages/librelp-devel/COPYING
/usr/share/doc/packages/librelp-devel/ChangeLog
/usr/share/doc/packages/librelp-devel/NEWS
/usr/share/doc/packages/librelp-devel/README
/usr/share/doc/packages/librelp-devel/gfdl.html
/usr/share/doc/packages/librelp-devel/relp.html


Generated by rpm2html 1.8.1

Fabrice Bellet, Fri Apr 26 23:37:53 2024