Read the description of this issue at
A patch for 2.6 was committed:
Impact looks like it is a unprivileged DoS at least, possibly more.
Currently embargoed, no date set.
public, removing embargo
A fix for this problem has just been committed to the RHEL3 U6
patch pool this evening (in kernel version 2.4.21-32.6.EL).
*** Bug 157805 has been marked as a duplicate of this bug. ***
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.