A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html | Mailing List Third Party Advisory |
https://access.redhat.com/security/cve/cve-2011-1489 | Exploit Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1489 | Issue Tracking Third Party Advisory |
https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a | Patch Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2011-1489 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2019-11-14 02:15
Updated : 2024-02-04 20:39
NVD link : CVE-2011-1489
Mitre link : CVE-2011-1489
CVE.ORG link : CVE-2011-1489
JSON object : View
Products Affected
debian
- debian_linux
rsyslog
- rsyslog
opensuse
- opensuse
CWE
CWE-772
Missing Release of Resource after Effective Lifetime