A user triggerable null pointer occurs when parsing invalid DBref records. This was reported by Jibbers McGee. This can be triggered in Mongo shell: db.python532.insert({x : {"$ref" : "whatever"} }); Or in Python shell: import pymongo pymongo.MongoClient().test.python532.find_one() A workaround is reportedly available: Add "process_dbrefs=False" to all the drivers External reference: https://jira.mongodb.org/browse/PYTHON-532 Upstream patch: https://github.com/mongodb/mongo-python-driver/commit/a060c15ef87e0f0e72974c7c0e57fe811bbd06a2
Created mongodb tracking bugs for this issue Affects: epel-all [bug 969563]
Created mongodb tracking bugs for this issue Affects: fedora-all [bug 969566]
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2013:1170 https://rhn.redhat.com/errata/RHSA-2013-1170.html
Statement: Red Hat Update Infrastructure 2.1.3 is now in Production 2 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Update Infrastructure Life Cycle: https://access.redhat.com/support/policy/updates/rhui.