Linux kernel built with the fast userspace mutexes(CONFIG_FUTEX) support is
vulnerable to a NULL pointer dereference flaw. It could occur when a waiting
task requests wait to be re-queued from non-PI futex to a PI-aware futex via
An unprivileged user/program could use this flaw to crash the system kernel
resulting in DoS.
This issue does not affect the versions of the kernel package as shipped with
Red Hat Enterprise Linux 5 and 7, and Red Hat Enterprise MRG 2.
A NULL pointer dereference flaw was found in the way the futex_wait_requeue_pi() function of the Linux kernel's futex subsystem handled the requeuing of certain Priority Inheritance (PI) futexes. A local, unprivileged user could use this flaw to crash the system.
This issue has been addressed in following products:
Red Hat Enterprise Linux 6
Via RHSA-2014:0981 https://rhn.redhat.com/errata/RHSA-2014-0981.html