CVE-2015-1333 (retired)

Priority
Description
Memory leak in the __key_link_end function in security/keys/keyring.c in
the Linux kernel before 4.1.4 allows local users to cause a denial of
service (memory consumption) via many add_key system calls that refer to
existing keys.
Ubuntu-Description
Colin King discovered a flaw in the add_key function of the Linux kernel's
keyring subsystem. A local user could exploit this flaw to cause a denial
of service (memory exhaustion).
Notes
 jdstrand> android kernels (flo, goldfish, grouper, maguro, mako and manta) are
  not supported on the Ubuntu Touch 14.10 and earlier preview kernels
 jdstrand> linux-lts-saucy no longer receives official support
 jdstrand> linux-lts-quantal no longer receives official support
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.2.0-16.19)
Patches:
Introduced by 034faeb9ef390d58239e1dce748143f6b35a0d9bFixed by ca4da5dd1f99fe9c59f1709fb43e818b18ad20e0
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1001.10)
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1003.3)
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.8.0-36.36~16.04.1)
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.8.0-36.36~16.04.1)
Product
linux-krillin:not-affected
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.2.0-1013.19)
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1012.12)
Package
Upstream:released (4.2~rc5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Product
linux-vegetahd:not-affected
More Information

Updated: 2019-09-19 15:52:39 UTC (commit d32ebc32606b9517c6fa7d65a15441e2a57a6de5)