Thank you for reporting this bug to Ubuntu. Dapper reached EOL, please see this
document for currently supported Ubuntu releases:
https://wiki.ubuntu.com/Releases
Feel free to report any other bugs you may find.
** Changed in: linux-source-2.6.15 (Ubuntu)
Status: Confirmed = Won't Fix
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux-source-2.6.15 (Ubuntu)
Importance: High = Wishlist
** Changed in: linux (Ubuntu)
Status: New = Fix Released
** Changed in: linux (Ubuntu)
Importance: Undecided = Low
--
Unprivileged
Exploit does not work here on Jaunty. sched_setscheduler returns -1
(failure) for a normal user (0 for root). Has this been fixed?
Updated code to print out the return value:
#include sched.h
#include stdio.h
int main() {
struct sched_param param;
param.sched_priority =
Not as far as I know, Ben.
--
Unprivileged users can monopolize CPU using SCHED_FIFO and max priority
https://bugs.launchpad.net/bugs/52600
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
What is the status of this? It looks like this bug just kind of died.
Has unprivileged real-time scheduling been implemented properly yet?
--
Unprivileged users can monopolize CPU using SCHED_FIFO and max priority
https://bugs.launchpad.net/bugs/52600
You received this bug notification because
** Changed in: linux-source-2.6.15 (Ubuntu)
Status: New = Confirmed
** Visibility changed to: Public
--
Unprivileged users can monopolize CPU using SCHED_FIFO and max priority
https://bugs.launchpad.net/bugs/52600
You received this bug notification because you are a member of Ubuntu