A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset.
References
Link | Resource |
---|---|
https://security-tracker.debian.org/tracker/CVE-2011-1489 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1489 | Issue Tracking Third Party Advisory |
https://access.redhat.com/security/cve/cve-2011-1489 | Exploit Patch Third Party Advisory |
https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2019-11-13 18:15
Updated : 2020-08-18 08:05
NVD link : CVE-2011-1489
Mitre link : CVE-2011-1489
JSON object : View
CWE
CWE-772
Missing Release of Resource after Effective Lifetime
Products Affected
debian
- debian_linux
opensuse
- opensuse
rsyslog
- rsyslog