1
0
mirror of https://github.com/SoftEtherVPN/SoftEtherVPN.git synced 2024-11-15 06:00:39 +03:00
Commit Graph

1705 Commits

Author SHA1 Message Date
Ilya Shipitsin
2584adfd87
Merge pull request #905 from chipitsine/master
Merge PR #905: travis-ci: update dotnet sdk version
2019-05-03 20:48:23 +00:00
Ilya Shipitsin
b0f6ac1248
Merge branch 'master' into master 2019-05-03 18:15:45 +00:00
Ilya Shipitsin
4e9c3358d1
Merge pull request #906 from hww3/hww3/illumos-ci
Merge PR #906: Add basic CI definition for illumos
2019-04-26 23:39:38 +00:00
William Welliver
59d57338a5 Add basic CI definition for illumos 2019-04-26 10:36:11 -04:00
Ilya Shipitsin
0060ba6c18 travis-ci: update dotnet sdk version
also, we need to to switch to xenial, dotnet sdk is not available for trusty
2019-04-22 00:54:39 +05:00
Ilya Shipitsin
560b90d02c
Merge pull request #904 from ronneke1996/increase-tasksmax-vpnserver-unit-file
Merge PR #904: Increased the task limit of the unit file
2019-04-20 12:06:24 +00:00
Ron Nabuurs
a2e2d5133b
Increased the task limit of the unit file to be 4096 (max
connections per hub) * 4096 (max hubs)
2019-04-19 11:59:48 +02:00
Davide Beatrici
b43a1e76da
Merge PR #900: release 5.01.9670 2019-04-08 20:49:22 +02:00
Ilya Shipitsin
854814475c release 5.01.9670 2019-04-07 19:11:27 +00:00
Ilya Shipitsin
bf8cd35508
Merge pull request #899 from MatAtBread/issue-898
Merge PR #899: Set unbuffered mode for *nix systems stdout, allowing interactive use…
2019-04-07 23:52:50 +05:00
MatAtBread
6dbcda6026 Set unbuffered mode for *nix systems stdout, allowing interactive use within spawned processes. Fixes issue #898 2019-04-07 19:13:18 +01:00
Davide Beatrici
afa93c8b84
Merge PR #896: introduce cirrus-ci builds 2019-04-02 19:48:07 +02:00
Ilya Shipitsin
388da69793 avoid non needed ci builds 2019-04-02 11:16:36 +05:00
Ilya Shipitsin
9e8c277cf3 initial cirrus-ci config 2019-03-27 22:49:48 +05:00
Davide Beatrici
89dfa319f3
Merge PR #893: travis-ci: add linux-ppc64le to build matrix 2019-03-15 23:34:19 +01:00
Ilya Shipitsin
abbacdf2a0 travis-ci: add linux-ppc64le to build matrix 2019-03-16 00:30:54 +05:00
Davide Beatrici
ec72d90140
Merge PR #892: azure pipelines improvements 2019-03-13 20:11:24 +01:00
Ilya Shipitsin
d25d0c2465 azure pipelines windows: build artifacts, tests 2019-03-13 23:59:04 +05:00
Ilya Shipitsin
1de08b05b2 azure pipelines linux: remove not needed setting 2019-03-13 23:58:17 +05:00
Ilya Shipitsin
03f4ced2c7
Merge pull request #891 from chipitsine/master
Merge PR #891: Azure Pipelines: refactoring, adding windows target
2019-03-13 01:51:17 +05:00
Ilya Shipitsin
13b531c763 Azure Pipelines: refactoring, adding windows target 2019-03-13 01:37:47 +05:00
Davide Beatrici
2f12e54fbc
Merge PR #889: some build cleanup 2019-03-11 19:15:26 +01:00
Ilya Shipitsin
8f790eeca0 rename azure-pipelines.yml to .azure-pipelines.yml 2019-03-11 22:43:35 +05:00
Ilya Shipitsin
a9468c8cd9 configure.cmd: fail on compilation fail 2019-03-11 22:42:53 +05:00
Davide Beatrici
ec7a0512f6
Merge PR #888: Fixed the RsaVerifyEx function buffer overflow problem 2019-03-06 17:43:37 +01:00
Daiyuu Nobori
98443715d9 Fixed the vulnerability that a malformed packet will cause the buffer overflow at the receive path. This vulnerability may occur abnormal process exit with the buffer security check mechanism built-in with SoftEther VPN binary. Although this buffer overflow can theoretically bypass the security check in theory, in the actual binary it is detected by the buffer security check inserted by the C compiler and the process is forcibly terminated. Therefore, as a result, it can be abused by a DoS attacker. Acknowledgments: The last problems is discovered and reported by Fabrizio Steiner. 2019-02-28 20:40:23 +09:00
Davide Beatrici
beef8d6892
Merge PR #885: Rename "azure-pipelines.yml" to ".azure-pipelines.yml" 2019-02-27 22:40:14 +01:00
Davide Beatrici
bb56998a4e Rename "azure-pipelines.yml" to ".azure-pipelines.yml" 2019-02-27 21:51:53 +01:00
Davide Beatrici
ba94d8a6fa
Merge PR #884: Fix memory leak in OpenSSL deinitialization function 2019-02-27 21:47:52 +01:00
vvd
372e8aa031 Fixed memory leak in OpenSSL deinitialization function 2019-02-27 21:41:20 +01:00
Davide Beatrici
e750ace40a
Merge PR #883: Fix compilation without OpenSSL ENGINE 2019-02-25 23:33:54 +01:00
Rosen Penev
26261236ba
Fix compilation without OpenSSL ENGINE 2019-02-25 14:24:31 -08:00
Ilya Shipitsin
6773eb3e0b
Merge pull request #877 from paskal/patch-1
Merge PR #877: Adjust launchpad ppa links
2019-02-16 22:44:59 +05:00
Dmitry Verkhoturov
e0467c0a39
adjust launchpad ppa links 2019-02-16 19:42:07 +03:00
Davide Beatrici
d7941be664
Merge PR #875: Fixed wrong function name in Debug message 2019-02-16 03:04:07 +01:00
Nick
23b8161ac2
Fixed wrong function name in Debug message 2019-02-15 20:41:16 -05:00
Davide Beatrici
c1243c5198
Merge PR #873: ver.rc: fix misspelling 2019-02-14 08:51:19 +01:00
Davide Beatrici
270d9f1e0b
Merge PR #872: Fix to show correct version in Server Manager GUI 2019-02-14 08:38:09 +01:00
parly
962356af9c Fix misspelling 2019-02-14 16:07:35 +09:00
parly
5a7e4693fc Fix GetCedarVersionNumber() 2019-02-14 16:04:16 +09:00
Ilya Shipitsin
d790223700 release 5.01.9669 2019-02-03 19:43:50 +00:00
Ilya Shipitsin
a5b816aa59
Merge pull request #869 from chipitsine/launchpad
Merge PR #869: disable cpu features on arm64, amrhf, s390x
2019-02-04 00:19:52 +05:00
Ilya Shipitsin
45c13c5409 disable cpu features on arm64, amrhf, s390x
tested on launchpad
2019-02-03 18:05:34 +05:00
Ilya Shipitsin
c253c55a8c
Merge pull request #862 from davidebeatrici/mayaqua-getcipherlist-double-free-fix
Merge PR #862: Fix crashes in GetCipherList() and StGetServerCipherList()
2019-01-29 19:31:57 +05:00
Ilya Shipitsin
ce6e49a3f9 release 5.01.9668 2019-01-27 07:49:56 +00:00
Davide Beatrici
8657955c92 Merge PR #867: Improve translations for inf file. 2019-01-24 01:42:25 +01:00
Davide Beatrici
a97b87da68 Cedar/Admin.c: fix segmentation fault caused by non-initialized string in StGetServerCipherList()
StrCat() appends a string to an already existing string. In order to know where the existing string ends, it uses StrLen() which in turn uses strlen(), a function considered unsafe because it doesn't stop until it finds the null character.

Since the string was allocated but not initialized, StrCat() was either:

- Working correctly.
- Copying only a part of the string.
- Making the program crash via strlen().

The fix consists in using StrCpy(), which starts writing at the beginning of the string.
2019-01-21 04:15:55 +01:00
Davide Beatrici
09ee19e72b Mayaqua/Network.c: fix double free crash in GetCipherList()
SSL_free() also frees the associated context.

d6c3c1896c/ssl/ssl_lib.c (L1209)

From https://www.openssl.org/docs/man1.1.1/man3/SSL_free.html:

"SSL_free() also calls the free()ing procedures for indirectly affected items, if applicable: the buffering BIO, the read and write BIOs, cipher lists specially created for this ssl, the SSL_SESSION. Do not explicitly free these indirectly freed up items before or after calling SSL_free(), as trying to free things twice may lead to program failure."
2019-01-21 04:14:47 +01:00
Umi
e939f887c4 Update vpninstall_cn.inf 2019-01-21 03:59:31 +01:00
Daiyuu Nobori
63c01ba736
Merge pull request #832 from dnobori/181202_switch_to_apache_license
Switching license from GPLv2 to Apache License 2.0.
2019-01-21 09:36:19 +09:00