** Description changed: - A tight loop in user level process isn't preempted unless a realtime - process is woken up on the cpu. Some important kernel threads such as - events/*, kblockd/* can be blocked by the process, and the machine - stalls. Unprivileged local user could use this flaw to DoS the system. + The Linux kernel before 2.6.37 does not properly implement a certain + clock-update optimization, which allows local users to cause a denial of + service (system hang) via an application that executes code in a loop. Break-Fix: a64692a3afd85fe048551ab89142fd5ca99a0dbd f26f9aff6aaf67e9a430d16c266f91b13a5bff64
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/911401 Title: CVE-2011-4621 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/911401/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
