A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset
References
Link | Resource |
---|---|
https://security-tracker.debian.org/tracker/CVE-2011-1490 | Third Party Advisory |
https://access.redhat.com/security/cve/cve-2011-1490 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1490 | Issue Tracking Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html | Mailing List Third Party Advisory |
https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2019-11-13 18:15
Updated : 2020-08-18 08:05
NVD link : CVE-2011-1490
Mitre link : CVE-2011-1490
JSON object : View
CWE
CWE-772
Missing Release of Resource after Effective Lifetime
Products Affected
debian
- debian_linux
opensuse
- opensuse
rsyslog
- rsyslog