It was reported that it's possible for any user to run the kernel out of memory through a memory leak in add_key(). Acknowledgements: Red Hat would like to thank Canonical for reporting this issue.
Created attachment 1054857 [details] CVE-2015-1333.patch
Statement: This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.
References: http://www.openwall.com/lists/oss-security/2015/07/27/7
This issue has been addressed in the following products: MRG for RHEL-6 v.2 Via RHSA-2015:1787 https://rhn.redhat.com/errata/RHSA-2015-1787.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:1788 https://rhn.redhat.com/errata/RHSA-2015-1788.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:1778 https://rhn.redhat.com/errata/RHSA-2015-1778.html