Risk Scores
EPSS Score
0.02%
5.6th percentile
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ubuntu:16.04:LTS | linux-oem | 4.13.0-1012.13, 4.13.0-1010.11, 4.13.0-1008.9 |
| Ubuntu:14.04:LTS | linux-lts-xenial | 4.4.0-108.131~14.04.1, 4.4.0-111.134~14.04.1, 4.4.0-112.135~14.04.1 |
| Ubuntu:22.04:LTS | linux-intel-iot-realtime | 5.15.0-1073.75, 0 |
| Ubuntu:16.04:LTS | linux-azure | 4.11.0-1009.9, 0, 4.11.0-1011.11 |
| Ubuntu:22.04:LTS | linux-riscv | 5.15.0-1008.8, 5.15.0-1007.7, 5.15.0-1006.6 |
| Ubuntu:16.04:LTS | linux | 4.4.0-15.31, 4.4.0-14.30, 4.4.0-13.29 |
| Ubuntu:Pro:FIPS:16.04:LTS | linux-fips | 0, 4.4.0-1003.3, 4.4.0-1005.5 |
| Ubuntu:14.04:LTS | linux-aws | 4.4.0-1010.10, 0, 4.4.0-1002.2 |
| Ubuntu:20.04:LTS | linux-azure-fde | 0, 5.4.0-1063.66+cvm2.2, 5.4.0-1063.66+cvm3.2 |
| Ubuntu:20.04:LTS | linux-gke | 0, 5.4.0-1033.35, 5.4.0-1035.37 |
| Ubuntu:20.04:LTS | linux-raspi2 | 0, 5.3.0-1007.8, 5.3.0-1014.16 |
| Ubuntu:22.04:LTS | linux-realtime | 0, 5.15.0-1032.35 |
| Ubuntu:14.04:LTS | linux | 3.13.0-62.102, 3.11.0-12.19, 3.12.0-1.3 |
| Ubuntu:16.04:LTS | linux-snapdragon | 4.4.0-1069.74, 4.4.0-1071.76, 4.4.0-1084.89 |
| Ubuntu:16.04:LTS | linux-aws | 4.4.0-1030.39, 4.4.0-1017.26, 4.4.0-1018.27 |
| Ubuntu:16.04:LTS | linux-hwe | 4.8.0-56.61~16.04.1, 4.10.0-28.32~16.04.2, 0 |
| Ubuntu:20.04:LTS | linux-riscv | 5.4.0-36.41, 5.4.0-34.38, 5.4.0-33.37 |
| Ubuntu:16.04:LTS | linux-kvm | 4.4.0-1009.14, 4.4.0-1019.24, 4.4.0-1017.22 |
| Ubuntu:16.04:LTS | linux-gcp | 4.13.0-1011.15, 4.13.0-1008.11, 4.13.0-1007.10 |
| Ubuntu:16.04:LTS | linux-raspi2 | 4.4.0-1016.22, 4.4.0-1017.23, 4.4.0-1019.25 |
…and 1 more
Timeline
- Dec 20, 2017 CVE Published
- Apr 14, 2021 EPSS Score
- Jun 22, 2021 EPSS Score
- Aug 23, 2021 EPSS Score
- Oct 24, 2021 EPSS Score
- Dec 25, 2021 EPSS Score
- Feb 4, 2022 EPSS Score
- Feb 25, 2022 EPSS Score
- Apr 28, 2022 EPSS Score
- Aug 31, 2022 EPSS Score
- Nov 1, 2022 EPSS Score
- Jan 2, 2023 EPSS Score
References
- https://ubuntu.com/security/CVE-2017-17805 third-party-advisory
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ecaaab5649781c5a0effdaf298a925063020500e third-party-advisory
- https://github.com/torvalds/linux/commit/ecaaab5649781c5a0effdaf298a925063020500e third-party-advisory
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8 third-party-advisory
- https://ubuntu.com/security/notices/USN-3617-1 vendor-advisory
- https://ubuntu.com/security/notices/USN-3617-2 vendor-advisory
- https://ubuntu.com/security/notices/USN-3617-3 vendor-advisory
- https://ubuntu.com/security/notices/USN-3619-1 vendor-advisory
- https://ubuntu.com/security/notices/USN-3620-1 vendor-advisory
- https://ubuntu.com/security/notices/USN-3620-2 vendor-advisory
- https://ubuntu.com/security/notices/USN-3619-2 vendor-advisory
- https://ubuntu.com/security/notices/USN-3632-1 vendor-advisory
- https://www.cve.org/CVERecord?id=CVE-2017-17805 third-party-advisory