A tight loop in user level process isn't preempted unless a realtime process is woken up on the cpu. Some important kernel threads such as events/*, kblockd/* can be blocked by the process, and the machine stalls.
Unprivileged local user could use this flaw to DoS the system.
Red Hat would like to thank Masaki Tachibana for reporting this issue.
Added CVE-2011-4621 as per http://www.openwall.com/lists/oss-security/2011/12/21/6
Created kernel tracking bugs for this issue
Affects: fedora-all [bug 812183]
This issue does not affect Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.