{"id":"USN-5419-1","summary":"rsyslog vulnerabilities","details":"It was discovered that Rsyslog improperly handled certain invalid input. An\nattacker could use this issue to cause Rsyslog to crash.\n","modified":"2026-02-10T04:42:37Z","published":"2022-05-12T08:43:35Z","related":["UBUNTU-CVE-2018-16881","UBUNTU-CVE-2019-17041","UBUNTU-CVE-2019-17042"],"upstream":["CVE-2018-16881","CVE-2019-17041","CVE-2019-17042","UBUNTU-CVE-2018-16881","UBUNTU-CVE-2019-17041","UBUNTU-CVE-2019-17042"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5419-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16881"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-17041"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-17042"}],"affected":[{"package":{"name":"rsyslog","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/rsyslog@8.16.0-1ubuntu3.1+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.16.0-1ubuntu3.1+esm1"}]}],"versions":["8.12.0-1ubuntu2","8.12.0-1ubuntu3","8.14.0-2ubuntu1","8.14.0-2ubuntu2","8.16.0-1ubuntu1","8.16.0-1ubuntu2","8.16.0-1ubuntu3","8.16.0-1ubuntu3.1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"8.16.0-1ubuntu3.1+esm1","binary_name":"rsyslog"},{"binary_version":"8.16.0-1ubuntu3.1+esm1","binary_name":"rsyslog-elasticsearch"},{"binary_version":"8.16.0-1ubuntu3.1+esm1","binary_name":"rsyslog-gnutls"},{"binary_version":"8.16.0-1ubuntu3.1+esm1","binary_name":"rsyslog-gssapi"},{"binary_version":"8.16.0-1ubuntu3.1+esm1","binary_name":"rsyslog-mysql"},{"binary_version":"8.16.0-1ubuntu3.1+esm1","binary_name":"rsyslog-pgsql"},{"binary_version":"8.16.0-1ubuntu3.1+esm1","binary_name":"rsyslog-relp"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2018-16881"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-17041"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-17042"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5419-1.json"}}],"schema_version":"1.7.3"}