News for package rsyslog

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 3.0 (quilt)
Source: rsyslog
Binary: rsyslog, rsyslog-doc, rsyslog-mysql, rsyslog-pgsql, rsyslog-gssapi, rsyslog-gnutls, rsyslog-relp
Architecture: any all
Version: 5.8.11-3+deb7u2
Maintainer: Michael Biebl <[email protected]>
Homepage: http://www.rsyslog.com/
Standards-Version: 3.9.3
Vcs-Browser: http://git.debian.org/?p=collab-maint/rsyslog.git;a=summary
Vcs-Git: git://git.debian.org/git/collab-maint/rsyslog.git
Build-Depends: debhelper (>= 8), dpkg-dev (>= 1.16.1), autotools-dev (>= 20100122.1), zlib1g-dev, libmysqlclient-dev, libpq-dev, libkrb5-dev, libgnutls-dev, librelp-dev, pkg-config
Package-List: 
 rsyslog deb admin important
 rsyslog-doc deb doc extra
 rsyslog-gnutls deb admin extra
 rsyslog-gssapi deb admin extra
 rsyslog-mysql deb admin extra
 rsyslog-pgsql deb admin extra
 rsyslog-relp deb admin extra
Checksums-Sha1: 
 eabba672b9cace696207028da703cf073956d505 2393222 rsyslog_5.8.11.orig.tar.gz
 d8e0322cfb3e7f1b572434e1863fb208ae52e42a 34467 rsyslog_5.8.11-3+deb7u2.debian.tar.gz
Checksums-Sha256: 
 f75b39cf22506f7a28d986d0a446a09a0806f253dba661f125a241a1b47d6285 2393222 rsyslog_5.8.11.orig.tar.gz
 f08fda53aa12aa806c01bb41ffe3289b15de2add54eea0cb8c786b127743e5b0 34467 rsyslog_5.8.11-3+deb7u2.debian.tar.gz
Files: 
 0e5ea5228310bebc0f9f6ddf0c3f5a84 2393222 rsyslog_5.8.11.orig.tar.gz
 5766f13d56db21bcb6db9c2a3ec2010c 34467 rsyslog_5.8.11-3+deb7u2.debian.tar.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=9j4K
-----END PGP SIGNATURE-----

Changes:
rsyslog (5.8.11-3+deb7u2) wheezy-security; urgency=high

  * debian/patches/05-pri-vulnerability-fix.patch:
    - CVE-2014-3683: Followup fix for CVE-2014-3634. The initial patch was
      incomplete. It did not cover cases where PRI values > MAX_INT caused
      integer overflows resulting in negative values.

 -- Michael Biebl <[email protected]>  Tue, 07 Oct 2014 23:30:24 +0200