** Description changed:

- A tight loop in user level process isn't preempted unless a realtime
- process is woken up on the cpu.  Some important kernel threads such as
- events/*, kblockd/* can be blocked by the process, and the machine
- stalls. Unprivileged local user could use this flaw to DoS the system.
+ The Linux kernel before 2.6.37 does not properly implement a certain
+ clock-update optimization, which allows local users to cause a denial of
+ service (system hang) via an application that executes code in a loop.
  
  Break-Fix: a64692a3afd85fe048551ab89142fd5ca99a0dbd
  f26f9aff6aaf67e9a430d16c266f91b13a5bff64

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/911401

Title:
  CVE-2011-4621

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/911401/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to