{"id":"CVE-2020-14314","details":"A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.","modified":"2026-04-15T23:59:40.385876567Z","published":"2020-09-15T20:15:13.213Z","related":["ALSA-2021:1578","SUSE-SU-2020:2485-1","SUSE-SU-2020:2486-1","SUSE-SU-2020:2540-1","SUSE-SU-2020:2541-1","SUSE-SU-2020:2574-1","SUSE-SU-2020:2575-1","SUSE-SU-2020:2576-1","SUSE-SU-2020:2582-1","SUSE-SU-2020:2605-1","SUSE-SU-2020:2610-1","SUSE-SU-2020:2623-1","SUSE-SU-2020:2631-1","openSUSE-SU-2020:1325-1","openSUSE-SU-2020:1382-1","openSUSE-SU-2021:0242-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","extracted_events":[{"last_affected":"v8-build12533"}],"cpe":"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12533:*:*:*:vsphere:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"v8-build12658"}],"cpe":"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12658:*:*:*:vsphere:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"v8-build12859"}],"cpe":"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12859:*:*:*:vsphere:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"v8-build13170"}],"cpe":"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13170:*:*:*:vsphere:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"v8-build13586"}],"cpe":"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13586:*:*:*:vsphere:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"v8-build13861"}],"cpe":"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13861:*:*:*:vsphere:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"14.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"16.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"18.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"20.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"9.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"5.8.9"}],"cpe":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"5.9.0-rc1"}],"cpe":"cpe:2.3:o:linux:linux_kernel:5.9.0:rc1:*:*:*:*:*:*"}]},"references":[{"type":"WEB","url":"https://lore.kernel.org/linux-ext4/f53e246b-647c-64bb-16ec-135383c70ad7%40redhat.com/T/#u"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4576-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4578-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4579-1/"},{"type":"ADVISORY","url":"https://www.starwindsoftware.com/security/sw-20210325-0003/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14314"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git","events":[{"introduced":"0"},{"fixed":"d012a7190fc1fd72ed48911e77ca97ba4521bccd"},{"fixed":"5872331b3d91820e14716632ebb56b1399b34fe1"}],"database_specific":{"source":["DESCRIPTION","REFERENCES"],"extracted_events":[{"introduced":"0"},{"fixed":"5.9-rc2"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-14314.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}