News for package rsyslog

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 3.0 (quilt)
Source: rsyslog
Binary: rsyslog, rsyslog-mysql, rsyslog-pgsql, rsyslog-mongodb, rsyslog-elasticsearch, rsyslog-gssapi, rsyslog-gnutls, rsyslog-relp
Architecture: any
Version: 8.4.2-1
Maintainer: Michael Biebl <[email protected]>
Homepage: http://www.rsyslog.com/
Standards-Version: 3.9.5
Vcs-Browser: http://anonscm.debian.org/gitweb/?p=collab-maint/rsyslog.git;a=summary
Vcs-Git: git://anonscm.debian.org/collab-maint/rsyslog.git
Build-Depends: debhelper (>= 8), dpkg-dev (>= 1.16.1), dh-autoreconf, dh-systemd (>= 1.4), zlib1g-dev, libmysqlclient-dev, libpq-dev, libmongo-client-dev (>= 0.1.4), libcurl4-gnutls-dev, libkrb5-dev, libgnutls28-dev, librelp-dev (>= 1.2.5), libestr-dev (>= 0.1.9), liblognorm-dev (>= 1.0.0), liblogging-stdlog-dev (>= 1.0.3), libjson-c-dev, uuid-dev, pkg-config, bison
Package-List:
 rsyslog deb admin important arch=any
 rsyslog-elasticsearch deb admin extra arch=any
 rsyslog-gnutls deb admin extra arch=any
 rsyslog-gssapi deb admin extra arch=any
 rsyslog-mongodb deb admin extra arch=any
 rsyslog-mysql deb admin extra arch=any
 rsyslog-pgsql deb admin extra arch=any
 rsyslog-relp deb admin extra arch=any
Checksums-Sha1:
 f68f92a1fa3d8fca6f4fc3dc4a7acbabc1774612 1938563 rsyslog_8.4.2.orig.tar.gz
 5f039e733e308ed2c66134cd578c3ba3364d29b6 22476 rsyslog_8.4.2-1.debian.tar.xz
Checksums-Sha256:
 71c3c6dac74fba2692f9fefb092cd3d22e2bd71eb702e0da06648de51b8b7b9a 1938563 rsyslog_8.4.2.orig.tar.gz
 c109eb9715b8ae6e953e9cc8623e3979cf494f32c572da9cb8b013dda99efc51 22476 rsyslog_8.4.2-1.debian.tar.xz
Files:
 5d0f39d5a4fdd4b3b91d80450f17f22e 1938563 rsyslog_8.4.2.orig.tar.gz
 2963c00a2bc6d869bb7b1037d00c0e4b 22476 rsyslog_8.4.2-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJULVNbAAoJEGrh3w1gjyLctZsP/1/6i9Z8z16gQsQqQYVQR/xG
D0d+EZEhKemUX10NBWmWt8iomp92um/+gzS11DkISNCG4kL9MkCp/YbWGy4FMkHv
W0UaKUe8SnJtnKJjl+zXAYvSp0XUVqrSH8x+RUO1QMf5Cl+Xz4WUZqLWBcCkkLLD
Yoio/nTrcVscwm+fjNpKaZjXibLi/S6vZh2lIv182UcdN6OW33bRKy/slinxGVGu
UTdm1wT4hx8ehpPnLKpqkv/Nin9i4tESQq+2MejFqZsQFvRRtIu/GampXvaPWsWG
Yt0OEN92lvmO3v4eEfcRC3D+tJ0DMW8d2ZF7thyzehqanekzFpEKj5wxNizBHkGy
kn2lkbj7nfT3kKC39GtE1H9bfu4tPdbOsu3c7h91Vmu9sStca2OWL+OPtQYeZvlc
Yg2JZMI1/KyUx1GjS1EaOncGdZwkWC91yoJ9OhDB9Tdlyz9jP9yMy2/LGMW+suPZ
S2M9IVE4k/ny2QCRY66PXTIVOc3QUmk/xoHepdqE3fSr0jAuIbAy6hHrxq+AlR4z
JhRKfxtQmXpaD135MqPg5SRpvtz4IepnpLV8PWexPYhPZfuK94kUPsg90SGxPZTo
6DFLp/AKF6lttqwYzxMBLl4Y63uCzx+VETAxVJ2PEUqDX/MCVIFI6A99k0N/fF/f
QWXLg7GRmxmBJlrhV0A5
=eAzN
-----END PGP SIGNATURE-----

Changes:
rsyslog (8.4.2-1) unstable; urgency=high

  * New upstream release.
    - CVE-2014-3683: The fix for CVE-2014-3634 incomplete. It did not cover
      cases where PRI values > MAX_INT caused integer overflows resulting in
      negative values.
  * Urgency high for the security fix.

 -- Michael Biebl <[email protected]>  Thu, 02 Oct 2014 15:27:25 +0200