First published: Wed Dec 21 2011(Updated: )
A tight loop in user level process isn't preempted unless a realtime process is woken up on the cpu. Some important kernel threads such as events/*, kblockd/* can be blocked by the process, and the machine stalls. Unprivileged local user could use this flaw to DoS the system. Upstream commit: <a href="http://git.kernel.org/linus/f26f9aff6aaf67e9a430d16c266f91b13a5bff64">http://git.kernel.org/linus/f26f9aff6aaf67e9a430d16c266f91b13a5bff64</a> Reference: <a href="https://lkml.org/lkml/2010/11/20/212">https://lkml.org/lkml/2010/11/20/212</a> Acknowledgements: Red Hat would like to thank Masaki Tachibana for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | <2.6.37 | |
Linux Kernel | <2.6.37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4621 is classified as a High severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2011-4621, upgrade to a kernel version later than 2.6.37 that addresses this vulnerability.
CVE-2011-4621 affects unprivileged local users running vulnerable versions of the Linux kernel.
CVE-2011-4621 allows an unprivileged local user to execute a denial of service attack, potentially blocking critical kernel threads.
The impact of CVE-2011-4621 can lead to system stalls and degraded performance due to blocked kernel threads.