First published: Thu Nov 14 2019(Updated: )
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rsyslog Rsyslog | <5.7.6 | |
openSUSE openSUSE | =11.4 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/rsyslog | 8.2102.0-2+deb11u1 8.2302.0-1 8.2406.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1489 is a memory leak vulnerability in rsyslog before version 5.7.6.
CVE-2011-1489 affects rsyslog versions before 5.7.6 by causing a memory leak when processing log messages with multiple rulesets.
The severity of CVE-2011-1489 is medium with a CVSS score of 5.5.
Rsyslog versions before 5.7.6, Opensuse 11.4, and Debian Linux 8.0, 9.0, and 10.0 are affected by CVE-2011-1489.
To fix CVE-2011-1489, update rsyslog to version 5.7.6 or later.