A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.
[
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"309717244481122767015044348447573151439",
"33970964619795919534887394176598136240",
"248739836982311303107519974025869515836",
"324941484924944945995525849319103693783",
"220921045690127562511149610233229634042",
"48092641811996452309143846703864541175",
"120281221308507681975757940407785010984"
]
},
"target": {
"file": "fs/ext4/namei.c"
},
"signature_version": "v1",
"id": "CVE-2020-14314-5f544bff",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@5872331b3d91820e14716632ebb56b1399b34fe1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "16129428555105127327426125864952587480",
"length": 2313.0
},
"target": {
"file": "fs/ext4/namei.c",
"function": "do_split"
},
"signature_version": "v1",
"id": "CVE-2020-14314-72b07dd0",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@5872331b3d91820e14716632ebb56b1399b34fe1"
}
]