CVE-2015-8324 REJECTED

The ext4 implementation in the Linux kernel before 2.6.34 does not properly track the initialization of certain data structures, which allows physically proximate attackers to cause a denial of service (NULL pointer dereference and panic) via a crafted USB device, related to the ext4_fill_super function.

EPSS 0.08% · 23.3th percentile

Risk Scores

EPSS Score
0.08%
23.3th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSlinux-mako0, 3.4.0-7.39
Ubuntu:14.04:LTSlinux-lts-utopic0
Ubuntu:16.04:LTSlinux-flo3.4.0-5.19, 0
Ubuntu:14.04:LTSlinux-lts-vivid0
Ubuntu:16.04:LTSlinux-gke0
Ubuntu:14.04:LTSlinux-aws0
Ubuntu:16.04:LTSlinux-raspi20
Ubuntu:14.04:LTSlinux-lts-wily0
Ubuntu:16.04:LTSlinux-aws0
Ubuntu:16.04:LTSlinux-hwe0
Ubuntu:14.04:LTSlinux-lts-xenial0
Ubuntu:16.04:LTSlinux-snapdragon0
Ubuntu:16.04:LTSlinux0
Ubuntu:16.04:LTSlinux-goldfish3.4.0-4.26, 3.4.0-4.24, 0
Ubuntu:14.04:LTSlinux0

Timeline

References

Open in Interactive Console →