Risk Scores
EPSS Score
0.07%
21.8th percentile
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ubuntu:16.04:LTS | linux-kvm | 0, 4.4.0-1058.65, 4.4.0-1056.63 |
| Ubuntu:16.04:LTS | linux-raspi2 | 4.4.0-1122.131, 0, 4.2.0-1013.19 |
| Ubuntu:20.04:LTS | linux-raspi2 | 5.4.0-1004.4, 5.3.0-1007.8, 5.4.0-1006.6 |
| Ubuntu:22.04:LTS | linux-riscv | 5.15.0-1019.22, 5.15.0-1018.21, 5.15.0-1017.19 |
| Ubuntu:Pro:FIPS:16.04:LTS | linux-fips | 4.4.0-1011.14, 4.4.0-1021.26, 4.4.0-1019.24 |
| Ubuntu:16.04:LTS | linux-hwe | 4.10.0-37.41~16.04.1, 4.10.0-35.39~16.04.1, 4.10.0-33.37~16.04.1 |
| Ubuntu:Pro:14.04:LTS | linux | 3.13.0-205.256, 3.13.0-207.258, 3.13.0-208.259 |
| Ubuntu:22.04:LTS | linux-realtime | 5.15.0-1032.35, 0 |
| Ubuntu:20.04:LTS | linux-azure-fde | 5.4.0-1063.66+cvm3.2, 5.4.0-1064.67+cvm1.1, 5.4.0-1065.68+cvm2.1 |
| Ubuntu:22.04:LTS | linux-intel-iot-realtime | 0, 5.15.0-1073.75 |
| Ubuntu:16.04:LTS | linux-snapdragon | 4.4.0-1035.39, 4.4.0-1032.36, 4.4.0-1030.33 |
| Ubuntu:24.04:LTS | linux-raspi-realtime | 6.8.0-2019.20, 0 |
| Ubuntu:Pro:14.04:LTS | linux-lts-xenial | 4.4.0-143.169~14.04.2, 0, 4.4.0-13.29~14.04.1 |
| Ubuntu:16.04:LTS | linux-gcp | 4.10.0-1009.9, 4.10.0-1008.8, 4.10.0-1007.7 |
| Ubuntu:18.04:LTS | linux-snapdragon | 0, 4.4.0-1081.86, 4.4.0-1079.84 |
| Ubuntu:20.04:LTS | linux-riscv | 5.4.0-33.37, 5.4.0-31.35, 5.4.0-30.34 |
| Ubuntu:16.04:LTS | linux | 4.4.0-159.187, 4.4.0-164.192, 4.4.0-161.189 |
| Ubuntu:Pro:14.04:LTS | linux-aws | 4.4.0-1014.14, 4.4.0-1046.50, 4.4.0-1048.52 |
| Ubuntu:20.04:LTS | linux-gke | 5.4.0-1067.70, 0, 5.4.0-1033.35 |
| Ubuntu:16.04:LTS | linux-aws | 4.4.0-1083.93, 4.4.0-1066.76, 4.4.0-1081.91 |
Timeline
- Aug 13, 2019 CVE Published
- Apr 14, 2021 EPSS Score
- Jun 22, 2021 EPSS Score
- Aug 23, 2021 EPSS Score
- Oct 24, 2021 EPSS Score
- Dec 25, 2021 EPSS Score
- Feb 4, 2022 EPSS Score
- Feb 25, 2022 EPSS Score
- Apr 28, 2022 EPSS Score
- Aug 31, 2022 EPSS Score
- Nov 1, 2022 EPSS Score
- Jan 2, 2023 EPSS Score
References
- https://ubuntu.com/security/CVE-2017-18509 third-party-advisory
- https://git.kernel.org/linus/99253eb750fda6a644d5188fb26c43bad8d5a745 third-party-advisory
- https://pulsesecurity.co.nz/advisories/linux-kernel-4.9-inetcsklistenstop-gpf third-party-advisory
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99253eb750fda6a644d5188fb26c43bad8d5a745 third-party-advisory
- https://github.com/torvalds/linux/commit/99253eb750fda6a644d5188fb26c43bad8d5a745 third-party-advisory
- https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html third-party-advisory
- https://lists.openwall.net/netdev/2017/12/04/40 third-party-advisory
- https://salsa.debian.org/kernel-team/linux/commit/baefcdc2f29923e7325ce4e1a72c3ff0a9800f32 third-party-advisory
- https://www.debian.org/security/2019/dsa-4497 third-party-advisory
- https://ubuntu.com/security/notices/USN-4145-1 vendor-advisory
- https://www.cve.org/CVERecord?id=CVE-2017-18509 third-party-advisory