Risk Scores
EPSS Score
0.07%
21.6th percentile
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ubuntu:22.04:LTS | linux-realtime | 5.15.0-1032.35, 0 |
| Ubuntu:22.04:LTS | linux-intel-iot-realtime | 5.15.0-1073.75, 0 |
| Ubuntu:16.04:LTS | linux-aws | 4.4.0-1035.44, 0, 4.4.0-1018.27 |
| Ubuntu:14.04:LTS | linux-lts-xenial | 4.4.0-70.91~14.04.1, 4.4.0-71.92~14.04.1, * |
| Ubuntu:20.04:LTS | linux-raspi2 | 5.4.0-1004.4, 5.4.0-1006.6, 0 |
| Ubuntu:20.04:LTS | linux-azure-fde | 5.4.0-1078.81+cvm1.1, 5.4.0-1063.66+cvm2.2, 5.4.0-1063.66+cvm3.2 |
| Ubuntu:16.04:LTS | linux-gke | 4.4.0-1014.14, 4.4.0-1016.16, 4.4.0-1018.18 |
| Ubuntu:24.04:LTS | linux-gcp-6.11 | 6.11.0-1014.14~24.04.1, 6.11.0-1016.16~24.04.1, * |
| Ubuntu:16.04:LTS | linux-snapdragon | 4.4.0-1026.29, 4.4.0-1019.22, 4.4.0-1057.61 |
| Ubuntu:24.04:LTS | linux-lowlatency-hwe-6.11 | *, 6.11.0-1009.10~24.04.1, 6.11.0-1013.14~24.04.1 |
| Ubuntu:16.04:LTS | linux-azure | 4.11.0-1009.9, 4.11.0-1016.16, 4.11.0-1015.15 |
| Ubuntu:16.04:LTS | linux | 4.4.0-13.29, 4.4.0-10.25, 4.4.0-64.85 |
| Ubuntu:16.04:LTS | linux-raspi2 | 4.4.0-1048.55, 4.4.0-1051.58, 4.4.0-1052.59 |
| Ubuntu:22.04:LTS | linux-riscv | 5.15.0-1012.13, 5.13.0-1004.4, 5.13.0-1007.7+22.04.1 |
| Ubuntu:Pro:20.04:LTS | linux-azure-fde-5.15 | 5.15.0-1070.79~20.04.1.1, *, * |
| Ubuntu:24.04:LTS | linux-raspi-realtime | 6.8.0-2019.20, 0 |
| Ubuntu:16.04:LTS | linux-gcp | 4.10.0-1006.6, 0, 4.10.0-1004.4 |
| Ubuntu:20.04:LTS | linux-gke | 5.4.0-1103.110, 5.4.0-1102.109, 5.4.0-1101.108 |
| Ubuntu:24.04:LTS | linux-hwe-6.11 | 0, 6.11.0-19.19~24.04.1, 6.11.0-21.21~24.04.1 |
| Ubuntu:14.04:LTS | linux | 3.13.0-52.85, 3.13.0-44.73, 3.13.0-62.102 |
…and 4 more
Timeline
- Sep 5, 2017 CVE Published
- Apr 14, 2021 EPSS Score
- Jun 22, 2021 EPSS Score
- Aug 23, 2021 EPSS Score
- Oct 24, 2021 EPSS Score
- Dec 25, 2021 EPSS Score
- Feb 25, 2022 EPSS Score
- Apr 28, 2022 EPSS Score
- Jun 29, 2022 EPSS Score
- Aug 31, 2022 EPSS Score
- Nov 1, 2022 EPSS Score
- Jan 2, 2023 EPSS Score
References
- https://ubuntu.com/security/CVE-2017-14140 third-party-advisory
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=197e7e521384a23b9e585178f3f11c9fa08274b9 third-party-advisory
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.9 third-party-advisory
- https://github.com/torvalds/linux/commit/197e7e521384a23b9e585178f3f11c9fa08274b9 third-party-advisory
- https://ubuntu.com/security/notices/USN-3444-1 vendor-advisory
- https://ubuntu.com/security/notices/USN-3444-2 vendor-advisory
- https://ubuntu.com/security/notices/USN-3583-1 vendor-advisory
- https://ubuntu.com/security/notices/USN-3583-2 vendor-advisory
- https://www.cve.org/CVERecord?id=CVE-2017-14140 third-party-advisory