Description
An issue was discovered in the Linux kernel before 5.0.1. There is a memory
leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause
denial of service.
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | released
(4.15.0-60.67)
|
Ubuntu 16.04 ESM: | released
(4.4.0-146.172)
|
Ubuntu 14.04 ESM: | ignored
(was needed ESM criteria)
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1047.49)
|
Ubuntu 16.04 ESM: | released
(4.4.0-1081.91)
|
Ubuntu 14.04 ESM: | released
(4.4.0-1042.45)
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(5.0.0-1021.24~18.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 16.04 ESM: | released
(4.15.0-1047.49~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | released
(5.0.0-1014.14~18.04.1)
|
Ubuntu 16.04 ESM: | released
(4.15.0-1056.61)
|
Ubuntu 14.04 ESM: | released
(4.15.0-1059.64~14.04.1)
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(5.3.0-1007.8~18.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | released
(5.0.0-1014.14~18.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1042.45)
|
Ubuntu 16.04 ESM: | released
(4.15.0-1041.43)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(5.3.0-1008.9~18.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1042.45)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1041.43)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(5.0.0-1011.11~18.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | released
(5.0.0-23.24~18.04.1)
|
Ubuntu 16.04 ESM: | released
(4.15.0-60.67~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(5.0.0-15.16~18.04.1)
|
Ubuntu 16.04 ESM: | released
(4.15.0-60.67~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1043.43)
|
Ubuntu 16.04 ESM: | released
(4.4.0-1044.50)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | released
(4.4.0-146.172~14.04.1)
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1056.65)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(5.0.0-1010.11)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1022.25)
|
Ubuntu 16.04 ESM: | released
(4.15.0-1022.25~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(5.0.0-1007.12~18.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1044.47)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(5.3.0-1017.19~18.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.1~rc1)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1062.69)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Updated: 2022-04-13 13:47:16 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)