kernel is vulnerable to denial of service. The exception fixup code for the futex_atomic_op1, futex_atomic_op2, and futex_atomic_cmpxchg_inatomic() macros replaced the LOCK prefix with a NOP instruction. A local, unprivileged user could use this flaw to cause a denial of service.
docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html-single/5.5_Technical_Notes/index.html#RHSA-2010:0839
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9d55b9923a1b7ea8193b8875c57ec940dc2ff027
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9d55b9923a1b7ea8193b8875c57ec940dc2ff027
kerneltrap.org/mailarchive/linux-kernel/2008/2/6/752194/thread
lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
marc.info/?l=oss-security&m=128935856605589&w=2
secunia.com/advisories/46397
securitytracker.com/id?1024709
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25
www.redhat.com/support/errata/RHSA-2010-0839.html
www.securityfocus.com/archive/1/520102/100/0/threaded
www.vmware.com/security/advisories/VMSA-2011-0012.html
access.redhat.com/errata/RHSA-2010:0839
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=429412
bugzilla.redhat.com/show_bug.cgi?id=633170