CVE-2020-14314
Linux Kernel vulnerability analysis and mitigation

Overview

A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This vulnerability was discovered by Jay Shin of Red Hat and allows a local user to crash the system if the directory exists. The vulnerability was assigned CVE-2020-14314 and has a CVSS 3.1 base score of 5.5 (Medium) (NVD).

Technical details

The vulnerability occurs in the ext4 filesystem implementation when accessing a directory with broken indexing, leading to an out-of-bounds read vulnerability. The issue specifically manifests in the do_split() function where under certain conditions with broken directory indexing, the code could attempt to access a negative array index. The bug was fixed in Linux kernel version 5.9-rc2 through a patch that guards against potential negative array indexing (Kernel Patch).

Impact

The primary impact of this vulnerability is to system availability. A local attacker with the ability to access or create directories on an ext3/ext4 filesystem could trigger the vulnerability to cause a denial of service through system crash (Red Hat Bugzilla).

Mitigation and workarounds

The primary mitigation is to update the Linux kernel to version 5.9-rc2 or later. For systems that cannot be immediately updated, a temporary workaround is to run the command 'e2fsck -Df /partition-name' to fix any broken directories on the partition or image (Red Hat Bugzilla).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management