rsyslog is an enhanced multi-threaded syslogd with database support and more.
Multiple vulnerabilities have been discovered in rsyslog. Please review the CVE identifiers referenced below for details.
Modules for TCP syslog reception have a heap buffer overflow when octet-counted framing is used. The attacker can corrupt heap values, leading to data integrity issues and availability impact. Remote code execution is unlikely to happen but not impossible.
There is no known workaround at this time.
All rsyslog users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/rsyslog-8.2206.0"