rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "rsyslog", "binary_version": "7.4.4-1ubuntu2.3" }, { "binary_name": "rsyslog-doc", "binary_version": "7.4.4-1ubuntu2.3" }, { "binary_name": "rsyslog-gnutls", "binary_version": "7.4.4-1ubuntu2.3" }, { "binary_name": "rsyslog-gssapi", "binary_version": "7.4.4-1ubuntu2.3" }, { "binary_name": "rsyslog-mysql", "binary_version": "7.4.4-1ubuntu2.3" }, { "binary_name": "rsyslog-pgsql", "binary_version": "7.4.4-1ubuntu2.3" }, { "binary_name": "rsyslog-relp", "binary_version": "7.4.4-1ubuntu2.3" } ] }