A tight loop in user level process isn't preempted unless a realtime process is woken up on the cpu. Some important kernel threads such as events/*, kblockd/* can be blocked by the process, and the machine stalls. Unprivileged local user could use this flaw to DoS the system. Upstream commit: http://git.kernel.org/linus/f26f9aff6aaf67e9a430d16c266f91b13a5bff64 Reference: https://lkml.org/lkml/2010/11/20/212 Acknowledgements: Red Hat would like to thank Masaki Tachibana for reporting this issue.
Added CVE-2011-4621 as per http://www.openwall.com/lists/oss-security/2011/12/21/6
Created kernel tracking bugs for this issue Affects: fedora-all [bug 812183]
Statement: This issue does not affect Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.