|
Bugzilla – Full Text Bug Listing |
| Summary: | auditd goes compute bound and locks up when sent SIGUSR1 | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE 10.2 | Reporter: | Crispin Cowan <crispin> |
| Component: | Security | Assignee: | Tony Jones <tonyj> |
| Status: | RESOLVED FIXED | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | ast, security-team |
| Version: | Final | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | |||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Crispin Cowan
2007-03-31 09:52:29 UTC
Not a security bug because it is only triggerable by root (or can it be triggered automatically by another process?). Reassigning to maintainer. Yes, in my testing, only root can trigger the bug. Whether that makes it "not a security bug" or not is a matter of opinion; auditing freaks would claim that even root should be audited, and this makes it trivial to suspend auditing. Realists would observe that root can mess with auditing without this bug. Reproduced in audit 1.2.6 (10.2). Fails to reproduce in audit 1.2.9 (stable and SP1). Thanks for the bug Crispin. Not sure it warrants a security fix as it's only root exploitable. If you disagree followup else I'll likely close this as fixed in next release. I agree that it is not a security bug, so apply whatever the policy is for functionality bug fixes. Is it our policy to not fix functionality bugs in openSUSE? The project manager is asked. AJ? or was it AnJa? actuaklyl anja. I would say: go for it if the fix is small. your wish is my command. SWAMPID is 9408 Checked into abuild for 10.2 update. released |