National Vulnerability Database issued CVE-2014-0196: The n_tty_write function in Linux kernel through 3.14.3 does not properly manage tty driver access in the LECHO & !OPOST case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
Basically, when two processes write to the same pty, the buffer end could be overwritten and so memory corruption into adjacent buffers could lead to crashes or code execution. To fix this issue, update your kernel to latest release:
This issue affects versions of Linux kernel packages shipped with Red Hat Enterprise Linux 6 prior to version kernel-2.6.32-358.6.2.el6, released via RHSA-2013:0744. The update added a backport of the upstream commit c56a00a165, which avoided this issue. Red Hat Enterprise Linux 5 is not affected.