rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
{
"binaries": [
{
"binary_name": "rsyslog",
"binary_version": "7.4.4-1ubuntu2.3"
},
{
"binary_name": "rsyslog-gnutls",
"binary_version": "7.4.4-1ubuntu2.3"
},
{
"binary_name": "rsyslog-gssapi",
"binary_version": "7.4.4-1ubuntu2.3"
},
{
"binary_name": "rsyslog-mysql",
"binary_version": "7.4.4-1ubuntu2.3"
},
{
"binary_name": "rsyslog-pgsql",
"binary_version": "7.4.4-1ubuntu2.3"
},
{
"binary_name": "rsyslog-relp",
"binary_version": "7.4.4-1ubuntu2.3"
}
],
"availability": "No subscription required"
}