Bug 248113 (CVE-2007-3719) - CVE-2007-3719 kernel: secretly Monopolizing the CPU Without Superuser Privileges
Summary: CVE-2007-3719 kernel: secretly Monopolizing the CPU Without Superuser Privileges
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2007-3719
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 297671 297681 297691 297701 297711 297721 297731
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-07-13 11:24 UTC by Marcel Holtmann
Modified: 2021-02-25 18:07 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-12-23 01:26:50 UTC
Embargoed:


Attachments (Terms of Use)

Description Marcel Holtmann 2007-07-13 11:24:33 UTC
The process scheduler in the Linux kernel 2.6.16 gives preference to
"interactive" processes that perform voluntary sleeps, which allows local users
to cause a denial of service (CPU consumption), as described in "Secretly
Monopolizing the CPU Without Superuser Privileges."

http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf

Comment 13 Eugene Teo (Security Response) 2010-12-23 01:26:50 UTC
Statement CVE-2007-3719:

The Red Hat Security Response Team has rated this issue as having moderate security impact.

The risks associated with fixing this bug are greater than the moderate severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG.


Note You need to log in before you can comment on or make changes to this bug.