It can be used as a DoS attack, so I consider it a security vulnerability. It does not need many privileges so it is likely to occur under realistic circumstances.
It can be used as a DoS attack, so I consider it a security vulnerability. It does not need many privileges so it is likely to occur under realistic circumstances.