ENSLTP 10.7.1 and later ships
libcurl library version: 7.69.1. With IPv6 explicitly disabled in the boot configuration,
libcurl uses a different system call to create a socket in
libcurl 7.69.1. This behavior is done as part of a Global Threat Intelligence (GTI) lookup for OAS. This system call invokes a kernel function
call_usermodehelper_exec, which in turn executes a user mode binary. Until the point that the binary gets executed, the GTI thread is in a blocked state. But, the execution of the binary generates multiple Fanotify events that ENSLTP blocks. Because the cyclic dependency blocks the GTI thread, any further events get queued in the ENSLTP user space and never released. This deadlock gradually develops into a system hang.