First published: Thu Nov 14 2019(Updated: )
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rsyslog Rsyslog | <5.7.6 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE openSUSE | =11.4 | |
debian/rsyslog | 8.2102.0-2+deb11u1 8.2302.0-1 8.2406.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1490 is a vulnerability in rsyslog before version 5.7.6 that could cause a memory leak and denial of service.
CVE-2011-1490 affects Rsyslog versions before 5.7.6 and Debian Linux versions 8.0, 9.0, and 10.0.
CVE-2011-1490 has a severity rating of medium, with a severity value of 5.5.
CVE-2011-1490 can be exploited by a local attacker sending a malicious log message, causing a memory leak and denial of service.
To fix CVE-2011-1490 in Debian Linux, update to the recommended versions: 8.1901.0-1+deb10u2, 8.2102.0-2+deb11u1, 8.2302.0-1, or 8.2310.0-2.