First published: Thu Jul 12 2007(Updated: )
The 4BSD process scheduler in the FreeBSD kernel performs scheduling based on CPU billing gathered from periodic process sampling ticks, which allows local users to cause a denial of service (CPU consumption) by performing voluntary nanosecond sleeps that result in the process not being active during a clock interrupt, as described in "Secretly Monopolizing the CPU Without Superuser Privileges."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3722 has a moderate severity level due to its potential to cause denial of service through CPU resource exhaustion.
To fix CVE-2007-3722, upgrade to the latest version of FreeBSD that has addressed this scheduling vulnerability.
Local users on systems running the FreeBSD kernel are affected by CVE-2007-3722.
CVE-2007-3722 represents a denial of service attack through excessive CPU consumption caused by specially crafted process sleep requests.
CVE-2007-3722 can be relatively easily exploited by local users who can manipulate process scheduling.