A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Link | Tags |
---|---|
https://security-tracker.debian.org/tracker/CVE-2011-1490 | third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1490 | issue tracking third party advisory |
https://access.redhat.com/security/cve/cve-2011-1490 | third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html | third party advisory mailing list |
https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a | third party advisory patch |