A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset.
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Link | Tags |
---|---|
https://security-tracker.debian.org/tracker/CVE-2011-1489 | third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1489 | third party advisory issue tracking |
https://access.redhat.com/security/cve/cve-2011-1489 | patch third party advisory exploit |
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html | third party advisory mailing list |
https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a | third party advisory patch |