rsyslog vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://rsyslog.com|rsyslog package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Heap-based Buffer Overflow

[,8.2204.1)
  • M
Resource Management Errors

[,7.4.1][7.4.1,7.5.2)
  • M
Denial of Service (DoS)

[,3.20.2)[3.21.0,3.21.9)[4.1.0,4.1.2)
  • M
Out-of-Bounds

[,4.6.8)[5.8.0,5.8.5)
  • M
Denial of Service (DoS)

[,4.6.6)[5.7.0,5.7.4)[6.1.0,6.1.4)
  • H
Access Restriction Bypass

[0,3.21.9)
  • H
Integer Overflow or Wraparound

[,8.27.0)
  • M
Memory Leak

[,5.7.6)
  • C
Improper Input Validation

[,8.1910.0)
  • C
Use of Externally-Controlled Format String

[,8.1908.0)
  • C
Out-of-bounds Read

[,8.1910.0)
  • M
Memory Leak

[,5.7.6)
  • H
Out-of-Bounds

[,7.6.6)[8.4.0,8.4.1)
  • M
Denial of Service (DoS)

[,7.6.7)[8.4.0,8.4.2)
  • C
Out-of-bounds Write

[,8.1910.0)
  • M
Memory Leak

[,5.7.6)