|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-2709: kernel: sysctl unregistration oops | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Ludwig Nussel <lnussel> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED WONTFIX | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | CVE-2005-2709: CVSS v2 Base Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: | patch | ||
|
Description
Ludwig Nussel
2005-11-04 10:47:12 UTC
Created attachment 56472 [details]
patch
dont know if it was applied yet, guess not... should be public now. I don't think we want this patch in a security update, because it changes the procfs inode and hence the kernel ABI. i have to agree. hmm, how do we approach this? or do we want to fix this at all? I think this is a clear wontfix. How many users can trigger a module unload? I can only think of myself pulling out the WLAN card... But then I am the console user and can damage the machine in other ways. Lets rest this issue with being fixed in STABLE and upcoming products. CVE-2005-2709: CVSS v2 Base Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P) |