rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "7.4.4-1ubuntu2.3", "binary_name": "rsyslog" }, { "binary_version": "7.4.4-1ubuntu2.3", "binary_name": "rsyslog-doc" }, { "binary_version": "7.4.4-1ubuntu2.3", "binary_name": "rsyslog-gnutls" }, { "binary_version": "7.4.4-1ubuntu2.3", "binary_name": "rsyslog-gssapi" }, { "binary_version": "7.4.4-1ubuntu2.3", "binary_name": "rsyslog-mysql" }, { "binary_version": "7.4.4-1ubuntu2.3", "binary_name": "rsyslog-pgsql" }, { "binary_version": "7.4.4-1ubuntu2.3", "binary_name": "rsyslog-relp" } ] }