Risk Scores
EPSS Score
0.05%
15.7th percentile
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ubuntu:16.04:LTS | linux-aws | 4.4.0-1049.58, 4.4.0-1022.31, 4.4.0-1026.35 |
| Ubuntu:22.04:LTS | linux-realtime | 0, 5.15.0-1032.35 |
| Ubuntu:16.04:LTS | linux-hwe | 4.8.0-58.63~16.04.1, 4.10.0-27.30~16.04.2, 4.10.0-28.32~16.04.2 |
| Ubuntu:20.04:LTS | linux-gke | 5.4.0-1056.59, 5.4.0-1105.112, 5.4.0-1104.111 |
| Ubuntu:20.04:LTS | linux-riscv | 5.4.0-26.30, 0, 5.4.0-24.28 |
| Ubuntu:Pro:FIPS:16.04:LTS | linux-fips | 4.4.0-1003.3, 4.4.0-1006.6, 4.4.0-1005.5 |
| Ubuntu:16.04:LTS | linux-gcp | 4.10.0-1006.6, 4.13.0-1015.19, 4.13.0-1013.17 |
| Ubuntu:16.04:LTS | linux-raspi2 | 4.4.0-1061.69, 4.4.0-1065.73, 4.4.0-1067.75 |
| Ubuntu:24.04:LTS | linux-raspi-realtime | 0, 6.8.0-2019.20 |
| Ubuntu:16.04:LTS | linux-azure | 4.11.0-1011.11, 4.11.0-1013.13, 4.11.0-1014.14 |
| Ubuntu:16.04:LTS | linux-oem | 4.13.0-1019.20, 0, 4.13.0-1008.9 |
| Ubuntu:16.04:LTS | linux-snapdragon | 4.4.0-1046.50, 4.4.0-1044.48, 4.4.0-1022.25 |
| Ubuntu:20.04:LTS | linux-azure-fde | 5.4.0-1103.109+cvm1.1, 5.4.0-1100.106+cvm1.1, 5.4.0-1098.104+cvm1.1 |
| Ubuntu:16.04:LTS | linux | 4.4.0-64.85, 4.4.0-65.86, 4.2.0-17.21 |
| Ubuntu:22.04:LTS | linux-intel-iot-realtime | 0, 5.15.0-1073.75 |
| Ubuntu:14.04:LTS | linux | 3.13.0-52.85, 3.13.0-147.196, 3.13.0-145.194 |
| Ubuntu:22.04:LTS | linux-riscv | 5.15.0-1012.13, 5.15.0-1014.16, 5.15.0-1015.17 |
| Ubuntu:14.04:LTS | linux-lts-xenial | 4.4.0-89.112~14.04.1, 4.4.0-92.115~14.04.1, 4.4.0-93.116~14.04.1 |
| Ubuntu:16.04:LTS | linux-kvm | 4.4.0-1012.17, 0, 4.4.0-1004.9 |
| Ubuntu:14.04:LTS | linux-aws | 4.4.0-1014.14, 4.4.0-1003.3, 4.4.0-1005.5 |
…and 1 more
Timeline
- Mar 1, 2018 CVE Published
- Apr 14, 2021 EPSS Score
- Jun 22, 2021 EPSS Score
- Aug 23, 2021 EPSS Score
- Oct 24, 2021 EPSS Score
- Dec 25, 2021 EPSS Score
- Feb 4, 2022 EPSS Score
- Feb 25, 2022 EPSS Score
- Apr 28, 2022 EPSS Score
- Aug 31, 2022 EPSS Score
- Nov 1, 2022 EPSS Score
- Jan 2, 2023 EPSS Score
References
- https://ubuntu.com/security/CVE-2017-18208 third-party-advisory
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91 third-party-advisory
- https://github.com/torvalds/linux/commit/6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91 third-party-advisory
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.4 third-party-advisory
- https://ubuntu.com/security/notices/USN-3619-1 vendor-advisory
- https://ubuntu.com/security/notices/USN-3619-2 vendor-advisory
- https://ubuntu.com/security/notices/USN-3653-1 vendor-advisory
- https://ubuntu.com/security/notices/USN-3653-2 vendor-advisory
- https://ubuntu.com/security/notices/USN-3655-1 vendor-advisory
- https://ubuntu.com/security/notices/USN-3655-2 vendor-advisory
- https://ubuntu.com/security/notices/USN-3657-1 vendor-advisory
- https://www.cve.org/CVERecord?id=CVE-2017-18208 third-party-advisory