A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html | Mailing List Third Party Advisory |
https://access.redhat.com/security/cve/cve-2011-1490 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1490 | Issue Tracking Third Party Advisory |
https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a | Patch Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2011-1490 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2019-11-14 02:15
Updated : 2024-02-28 17:28
NVD link : CVE-2011-1490
Mitre link : CVE-2011-1490
CVE.ORG link : CVE-2011-1490
JSON object : View
Products Affected
opensuse
- opensuse
rsyslog
- rsyslog
debian
- debian_linux
CWE
CWE-772
Missing Release of Resource after Effective Lifetime