See https://github.com/rsyslog/librelp/blob/master/ChangeLog#L8 More details will follow...
@ Arch teams: Please test and mark stable: =dev-libs/librelp-1.2.15
commit c4a8939473e1aa5db5f5da47dd91227eb696bf21 Author: Rolf Eike Beer <eike@sf-mail.de> Date: Fri Mar 23 07:52:19 2018 +0100 dev-libs/librelp: stable 1.2.15 for sparc, bug #651192
amd64 stable
x86 stable
CVE-2018-1000140 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000140): rsyslog librelp version 1.2.14 and earlier contains a Buffer Overflow vulnerability in the checking of x509 certificates from a peer that can result in Remote code execution. This attack appear to be exploitable a remote attacker that can connect to rsyslog and trigger a stack buffer overflow by sending a specially crafted x509 certificate.
arm64 stable
commit 90c659370a6bf70cc0bfb884bb0dcda352ada19e Author: Markus Meier <maekke@gentoo.org> Date: Wed Mar 28 06:58:54 2018 +0200 dev-libs/librelp: arm stable, bug #645870
hppa stable
@maintainer, please clean vulnerable. GLSA request filed.
This issue was resolved and addressed in GLSA 201804-21 at https://security.gentoo.org/glsa/201804-21 by GLSA coordinator Aaron Bauman (b-man).
re-opened for cleanup
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=245f43208e00065a6f83325c8a59634fd4aa559f commit 245f43208e00065a6f83325c8a59634fd4aa559f Author: Thomas Deutschmann <whissi@gentoo.org> AuthorDate: 2018-04-23 13:19:26 +0000 Commit: Thomas Deutschmann <whissi@gentoo.org> CommitDate: 2018-04-23 13:19:58 +0000 dev-libs/librelp: Security cleanup Bug: https://bugs.gentoo.org/651192 Package-Manager: Portage-2.3.31, Repoman-2.3.9 dev-libs/librelp/Manifest | 3 -- dev-libs/librelp/librelp-1.2.12.ebuild | 55 ---------------------------------- dev-libs/librelp/librelp-1.2.13.ebuild | 55 ---------------------------------- dev-libs/librelp/librelp-1.2.14.ebuild | 55 ---------------------------------- 4 files changed, 168 deletions(-)}
Repository is clean, all done.