Risk Scores
EPSS Score
0.33%
56.0th percentile
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ubuntu:14.04:LTS | linux-lts-vivid | 0, 3.19.0-61.69~14.04.1, 3.19.0-59.66~14.04.1 |
| Ubuntu:24.04:LTS | linux-realtime | 0, 6.8.1-1015.16 |
| Ubuntu:20.04:LTS | linux-gke | 5.4.0-1076.82, 5.4.0-1078.84, 5.4.0-1080.86 |
| Ubuntu:24.04:LTS | linux-azure-6.11 | 6.11.0-1008.8~24.04.1, 6.11.0-1012.12~24.04.1, 6.11.0-1013.13~24.04.1 |
| Ubuntu:20.04:LTS | linux-gkeop | 5.4.0-1069.73, 5.4.0-1102.106, 5.4.0-1101.105 |
| Ubuntu:18.04:LTS | linux-hwe | 5.3.0-42.34~18.04.1, 5.0.0-23.24~18.04.1, 5.3.0-70.66 |
| Ubuntu:20.04:LTS | linux-riscv | 5.4.0-37.42, 5.4.0-39.44, 5.4.0-40.45 |
| Ubuntu:16.04:LTS | linux-snapdragon | 4.4.0-1013.14, 4.4.0-1013.15, 0 |
| Ubuntu:14.04:LTS | linux | 3.13.0-68.111, 3.13.0-52.85, 3.13.0-22.44 |
| Ubuntu:22.04:LTS | linux-intel-iot-realtime | 0, 5.15.0-1073.75 |
| Ubuntu:16.04:LTS | linux-raspi2 | 4.2.0-1014.21, 0, 4.2.0-1013.19 |
| Ubuntu:22.04:LTS | linux-riscv | 0, 5.13.0-1004.4, 5.13.0-1006.6+22.04.1 |
| Ubuntu:14.04:LTS | linux-lts-wily | 4.2.0-22.27~14.04.1, 4.2.0-38.45~14.04.1, 4.2.0-36.42~14.04.1 |
| Ubuntu:24.04:LTS | linux-riscv | 6.8.0-60.63.1, 0, 6.5.0-9.9.1 |
| Ubuntu:16.04:LTS | linux | 4.4.0-18.34, 4.3.0-6.17, 4.3.0-5.16 |
| Ubuntu:22.04:LTS | linux-realtime | 0, 5.15.0-1032.35 |
| Ubuntu:24.04:LTS | linux-hwe-6.11 | 0, 6.11.0-17.17~24.04.2, 6.11.0-19.19~24.04.1 |
| Ubuntu:20.04:LTS | linux-azure-fde | 5.4.0-1074.77+cvm1.1, 5.4.0-1065.68+cvm2.1, 5.4.0-1064.67+cvm1.1 |
| Ubuntu:18.04:LTS | linux-azure | 4.15.0-1023.24, 4.18.0-1025.27~18.04.1, 5.0.0-1014.14~18.04.1 |
| Ubuntu:14.04:LTS | linux-lts-xenial | 0, 4.4.0-14.30~14.04.2, 4.4.0-15.31~14.04.1 |
…and 8 more
Timeline
- May 9, 2016 CVE Published
- Feb 4, 2022 EPSS Score
- Mar 28, 2022 EPSS Score
- May 19, 2022 EPSS Score
- Jul 10, 2022 EPSS Score
- Sep 1, 2022 EPSS Score
- Oct 23, 2022 EPSS Score
- Dec 14, 2022 EPSS Score
- Feb 4, 2023 EPSS Score
- Mar 7, 2023 EPSS Score
- Mar 28, 2023 EPSS Score
- May 19, 2023 EPSS Score
References
- https://ubuntu.com/security/CVE-2016-4569 third-party-advisory
- http://comments.gmane.org/gmane.linux.kernel/2214250 third-party-advisory
- http://www.openwall.com/lists/oss-security/2016/05/09/17 third-party-advisory
- https://git.kernel.org/cgit/linux/kernel/git/tiwai/sound.git/commit/?h=for-next&id=cec8f96e49d9be372fdb0c3836dcf31ec71e457e third-party-advisory
- https://ubuntu.com/security/notices/USN-3016-1 vendor-advisory
- https://ubuntu.com/security/notices/USN-3016-2 vendor-advisory
- https://ubuntu.com/security/notices/USN-3017-1 vendor-advisory
- https://ubuntu.com/security/notices/USN-3017-3 vendor-advisory
- https://ubuntu.com/security/notices/USN-3016-3 vendor-advisory
- https://ubuntu.com/security/notices/USN-3016-4 vendor-advisory
- https://ubuntu.com/security/notices/USN-3017-2 vendor-advisory
- https://ubuntu.com/security/notices/USN-3020-1 vendor-advisory
- https://ubuntu.com/security/notices/USN-3018-2 vendor-advisory
- https://ubuntu.com/security/notices/USN-3018-1 vendor-advisory
- https://ubuntu.com/security/notices/USN-3019-1 vendor-advisory
- https://ubuntu.com/security/notices/USN-3021-2 vendor-advisory
- https://ubuntu.com/security/notices/USN-3021-1 vendor-advisory
- https://www.cve.org/CVERecord?id=CVE-2016-4569 third-party-advisory