First published: Wed Dec 21 2011(Updated: )
A tight loop in user level process isn't preempted unless a realtime process is woken up on the cpu. Some important kernel threads such as events/*, kblockd/* can be blocked by the process, and the machine stalls. Unprivileged local user could use this flaw to DoS the system. Upstream commit: <a href="http://git.kernel.org/linus/f26f9aff6aaf67e9a430d16c266f91b13a5bff64">http://git.kernel.org/linus/f26f9aff6aaf67e9a430d16c266f91b13a5bff64</a> Reference: <a href="https://lkml.org/lkml/2010/11/20/212">https://lkml.org/lkml/2010/11/20/212</a> Acknowledgements: Red Hat would like to thank Masaki Tachibana for reporting this issue.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <2.6.37 | |
debian/linux-2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.