Risk Scores
EPSS Score
0.39%
60.0th percentile
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ubuntu:14.04:LTS | linux-aws | 0, 4.4.0-1002.2 |
| Ubuntu:14.04:LTS | linux-lts-xenial | 4.4.0-31.50~14.04.1, 4.4.0-72.93~14.04.1, 4.4.0-75.96~14.04.1 |
| Ubuntu:16.04:LTS | linux-kvm | 4.4.0-1007.12, 0, 4.4.0-1004.9 |
| Ubuntu:20.04:LTS | linux-raspi2 | 5.3.0-1014.16, 5.3.0-1007.8, 0 |
| Ubuntu:22.04:LTS | linux-intel-iot-realtime | 0, 5.15.0-1073.75 |
| Ubuntu:16.04:LTS | linux-snapdragon | 4.4.0-1044.48, 4.4.0-1078.83, 4.4.0-1077.82 |
| Ubuntu:16.04:LTS | linux-raspi2 | 4.4.0-1010.12, 4.4.0-1009.10, 4.4.0-1004.5 |
| Ubuntu:20.04:LTS | linux-gke | 5.4.0-1042.44, 5.4.0-1105.112, 5.4.0-1104.111 |
| Ubuntu:16.04:LTS | linux-gcp | 4.10.0-1004.4, 0, 4.10.0-1009.9 |
| Ubuntu:16.04:LTS | linux-aws | 4.4.0-1031.40, 4.4.0-1030.39, 4.4.0-1028.37 |
| Ubuntu:16.04:LTS | linux-azure | 4.11.0-1009.9, 0, 4.11.0-1011.11 |
| Ubuntu:24.04:LTS | linux-raspi-realtime | 0, 6.8.0-2019.20 |
| Ubuntu:16.04:LTS | linux | 4.4.0-65.86, 4.4.0-66.87, 4.4.0-67.88 |
| Ubuntu:16.04:LTS | linux-gke | 4.4.0-1013.13, 4.4.0-1014.14, 4.4.0-1016.16 |
| Ubuntu:14.04:LTS | linux | 3.13.0-27.50, 0, 3.13.0-92.139 |
| Ubuntu:20.04:LTS | linux-azure-fde | 5.4.0-1095.101+cvm1.1, 5.4.0-1092.97+cvm1.1, 5.4.0-1091.96+cvm1.1 |
| Ubuntu:16.04:LTS | linux-hwe | 4.8.0-42.45~16.04.1, 4.8.0-53.56~16.04.1, 4.8.0-54.57~16.04.1 |
| Ubuntu:22.04:LTS | linux-realtime | 0, 5.15.0-1032.35 |
| Ubuntu:22.04:LTS | linux-riscv | 5.13.0-1004.4, 5.15.0-1006.6, 5.15.0-1007.7 |
| Ubuntu:20.04:LTS | linux-riscv | 5.4.0-40.45, 5.4.0-31.35, 5.4.0-33.37 |
Timeline
- Oct 19, 2017 CVE Published
- Apr 14, 2021 EPSS Score
- Jun 22, 2021 EPSS Score
- Aug 23, 2021 EPSS Score
- Oct 24, 2021 EPSS Score
- Dec 25, 2021 EPSS Score
- Feb 4, 2022 EPSS Score
- Feb 25, 2022 EPSS Score
- Apr 28, 2022 EPSS Score
- Aug 31, 2022 EPSS Score
- Nov 1, 2022 EPSS Score
- Jan 2, 2023 EPSS Score
References
- https://ubuntu.com/security/CVE-2017-15649 third-party-advisory
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2a13f2d04c947adc536d19debb8fe66f110 third-party-advisory
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e third-party-advisory
- http://patchwork.ozlabs.org/patch/813945/ third-party-advisory
- http://patchwork.ozlabs.org/patch/818726/ third-party-advisory
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6 third-party-advisory
- https://blogs.securiteam.com/index.php/archives/3484 third-party-advisory
- https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110 third-party-advisory
- https://github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69e third-party-advisory
- https://ubuntu.com/security/notices/USN-3485-1 vendor-advisory
- https://ubuntu.com/security/notices/USN-3485-2 vendor-advisory
- https://ubuntu.com/security/notices/USN-3487-1 vendor-advisory
- https://ubuntu.com/security/notices/USN-3485-3 vendor-advisory
- https://ubuntu.com/security/notices/USN-3754-1 vendor-advisory
- https://www.cve.org/CVERecord?id=CVE-2017-15649 third-party-advisory
- Multiples vulnérabilités dans le noyau Linux d'Ubuntu advisory