Commit Graph

  • 0087442cb2 Accepting request 1281729 from security factory Ana Guerrero 2025-06-02 20:00:03 +00:00
  • ab11b3a269 - Update to 2.2.4: * Fix CVE-2025-46806 (bsc#1243120) for "Misaligned Memory Accesses in is_openvpn_protocol()" * Fix CVE-2025-46807 (bsc#1243122) for "File Descriptor Exhaustion in sslh-select and sslh-ev" * Fix potential parsing of undefined data in syslog probe (no CVE assigned) Michael Vetter 2025-06-02 05:29:39 +00:00
  • 9676625361 Accepting request 1275417 from security Dominique Leuenberger 2025-05-08 16:23:08 +00:00
  • dd6d351855 - Update to 2.2.3: * Reverse older commit: version.h cannot be included without breaking the build (everything recompiles every time) and the release archive creation (which relies on git tags). Michael Vetter 2025-05-08 07:01:08 +00:00
  • 8f7966a118 Accepting request 1267690 from security Ana Guerrero 2025-04-07 16:41:43 +00:00
  • 3e9eb2fd5e - Update to 2.2.1: * Fix compilation when libproxyprotocol is not present Michael Vetter 2025-04-07 13:52:34 +00:00
  • 84376cc705 Accepting request 1231378 from security Ana Guerrero 2024-12-16 18:17:53 +00:00
  • aed9ba3e8d - Update to 2.1.4: * Fix release archive Michael Vetter 2024-12-16 11:09:09 +00:00
  • df417626a8 Accepting request 1174775 from security leap-16.1 leap-16.0 Ana Guerrero 2024-05-17 18:06:24 +00:00
  • 848245e987 OBS-URL: https://build.opensuse.org/package/show/security/sslh?expand=0&rev=32 Michael Vetter 2024-05-17 06:58:30 +00:00
  • 11d8e3decd OBS-URL: https://build.opensuse.org/package/show/security/sslh?expand=0&rev=31 Michael Vetter 2024-05-17 06:53:05 +00:00
  • 6462243ac2 - Update to 2.1.2: * Fix inetd Michael Vetter 2024-05-17 06:41:06 +00:00
  • 98035cebc2 Accepting request 1161275 from security Ana Guerrero 2024-03-25 20:12:01 +00:00
  • 202c7b682a - Update to 2.1.1: * Fix MacOS build error Michael Vetter 2024-03-25 06:18:22 +00:00
  • e5b7d6ea88 Accepting request 1157812 from security Ana Guerrero 2024-03-14 16:45:00 +00:00
  • b58740e545 - Update to 2.1.0: * Support for the Landlock LSM. After initial setup, sslh gives up all local file access rights. * Reintroduced --ssl as an alias to --tls. * Introduce autoconf to adapt to landlock presence. * Close connexion without error message if remote client forcefully closes connexion, for Windows. Michael Vetter 2024-03-14 06:14:20 +00:00
  • 09cf95d6b8 Accepting request 1138229 from security Ana Guerrero 2024-01-12 22:45:43 +00:00
  • f9a55d42d2 - Update to 2.0.1: * New semver-compatible version number * New sslh-ev: this is functionaly equivalent to sslh-select (mono-process, only forks for specified protocols), but based on libev, which should make it scalable to large numbers of connections. * New log system: instead of –verbose with arbitrary levels, there are now several message classes. Each message class can be set to go to stderr, syslog, or both. Classes are documented in example.cfg. * UDP connections are now managed in a hash to avoid linear searches. The downside is that the number of UDP connections is a hard limit, configurable with the ‘udp_max_connections’, which defaults to 1024. Timeouts are managed with lists. * inetd merges stderr output to what is sent to the client, which is a security issue as it might give information to an attacker. When inetd is activated, stderr is forcibly closed. * New protocol-level option resolve_on_forward, requests that target names are resolved at each connection instead of at startup. Useful for dynamic DNS situations. Michael Vetter 2024-01-12 08:01:32 +00:00
  • 3ba87b7a56 Accepting request 976089 from security Dominique Leuenberger 2022-05-12 20:58:20 +00:00
  • 4eb61c61ca - switch to https source url Marcus Meissner 2022-05-03 14:27:38 +00:00
  • b16b806c20 Accepting request 916996 from security Dominique Leuenberger 2021-09-06 13:58:05 +00:00
  • 216d332f85 - Update to 1.22c: * Fix invalid size (#302) * Test aborted connections (#285) Michael Vetter 2021-09-06 07:14:04 +00:00
  • 2aff893a2f Accepting request 914168 from security Dominique Leuenberger 2021-08-25 18:58:18 +00:00
  • 9e03a01904 - Update to 1.22b: * do not timeout TCP connections (fix #300) * remove obsolete usage string and added lost version option * be more defensive when allocating and extending gap Michael Vetter 2021-08-25 07:05:54 +00:00
  • 6490429af9 Accepting request 887009 from security Dominique Leuenberger 2021-05-12 17:31:46 +00:00
  • 37a5c6723d Accepting request 884125 from home:elvigia:branches:security Richard Brown 2021-04-20 13:03:23 +00:00
  • b45f1dd86f Accepting request 823701 from security Dominique Leuenberger 2020-07-31 14:00:12 +00:00
  • 878c2b0a48 - Update to 1.21c: * Removed support for 'ssl' and fix a related segfault bug. Michael Vetter 2020-07-31 08:41:07 +00:00
  • c4d2d7e889 Accepting request 821821 from security Dominique Leuenberger 2020-07-20 19:03:16 +00:00
  • 1bd294dfe6 - Update to 1.21b: * Moved configuration and command-line management to use conf2struct. Changes are: - command line option <-F|--config> no longer defaults to /etc/sslh.cfg, so you have to specify it explicitly. - command line option <-v|--verbose> takes a mandatory integer parameter * Changed exit code for illegal command line parameter from 1 to 6 (for testing purposes) Michael Vetter 2020-07-20 07:53:01 +00:00
  • 522c6eb498 Accepting request 820686 from security Dominique Leuenberger 2020-07-14 06:00:28 +00:00
  • 5a7d9aad3c Accepting request 820632 from home:jubalh:branches:security Michael Vetter 2020-07-13 12:35:58 +00:00
  • 648b62f2be Accepting request 765434 from security Dominique Leuenberger 2020-01-18 11:18:38 +00:00
  • adbadd0673 Accepting request 764577 from home:namtrac:branches:security Michael Vetter 2020-01-15 10:32:06 +00:00
  • 0d8ce9fe03 Accepting request 651391 from home:jubalh:branches:security Lars Vogdt 2018-11-26 10:49:10 +00:00
  • 58f3aff345 Accepting request 539373 from home:computersalat:devel:security Lars Vogdt 2017-11-07 17:12:38 +00:00
  • 4a4cddccdd Accepting request 412101 from home:jsegitz:branches:security Lars Vogdt 2016-07-22 18:52:02 +00:00
  • 4d1e5a16b2 Accepting request 265696 from home:jsegitz:branches:security Marcus Meissner 2014-12-18 14:01:10 +00:00
  • 397048cffa build with libconfig-devel on SLE11 Lars Vogdt 2014-03-25 19:29:43 +00:00
  • dbb04d04f8 - update to 1.16: + Probes made more resilient, to incoming data containing NULLs. Also made them behave properly when receiving too short packets to probe on the first incoming packet. (Ondrej Kuzník) + Libcap support: Keep only CAP_NET_ADMIN if started as root with transparent proxying and dropping priviledges (enable USELIBCAP in Makefile). This avoids having to mess with filesystem capabilities. (Sebastian Schmidt/yath) + Fixed bugs related to getpeername that would cause sslh to quit erroneously (getpeername can return actual errors if connections are dropped before getting to getpeername). + Set IP_FREEDBIND if available to bind to addresses that don't yet exist. - compile with libcap support - added missing-call-to-setgroups-before-setuid.patch - removed patches fixed upstream: + sslh-asprintf.patch + sslh-chroot.patch Lars Vogdt 2014-03-25 19:16:58 +00:00
  • 688f8078d4 Accepting request 212032 from home:robverduijn:branches:security Dr. Werner Fink 2013-12-23 12:05:38 +00:00
  • 6a4870cab6 Accepting request 210740 from home:robverduijn:branches:security Marcus Meissner 2013-12-16 16:46:13 +00:00
  • ce533d3061 Accepting request 184401 from home:lrupp Marcus Meissner 2013-07-26 11:27:22 +00:00