Linux kernel built with the fast userspace mutexes(CONFIG_FUTEX) support is vulnerable to a NULL pointer dereference flaw. It could occur when a waiting task requests wait to be re-queued from non-PI futex to a PI-aware futex via FUTEX_WAIT_REQUEUE_PI operation. An unprivileged user/program could use this flaw to crash the system kernel resulting in DoS. Upstream fix: ------------- -> https://git.kernel.org/linus/6f7b0a2a5c0fb03be7c25bd1745baa50582348ef Introduced in: -------------- -> https://git.kernel.org/linus/52400ba946759af28442dee6265c5c0180ac7122
Statement: This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 and 7, and Red Hat Enterprise MRG 2.
IssueDescription: A NULL pointer dereference flaw was found in the way the futex_wait_requeue_pi() function of the Linux kernel's futex subsystem handled the requeuing of certain Priority Inheritance (PI) futexes. A local, unprivileged user could use this flaw to crash the system.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0981 https://rhn.redhat.com/errata/RHSA-2014-0981.html