A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.
                
            References
                    | Link | Resource | 
|---|---|
| http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html | Broken Link | 
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14385 | Issue Tracking Third Party Advisory | 
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933 | Patch Vendor Advisory | 
| https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html | Mailing List Third Party Advisory | 
| https://usn.ubuntu.com/4576-1/ | Third Party Advisory | 
| http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html | Broken Link | 
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14385 | Issue Tracking Third Party Advisory | 
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933 | Patch Vendor Advisory | 
| https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html | Mailing List Third Party Advisory | 
| https://usn.ubuntu.com/4576-1/ | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
History
                    21 Nov 2024, 05:03
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html - Broken Link | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14385 - Issue Tracking, Third Party Advisory | |
| References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933 - Patch, Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html - Mailing List, Third Party Advisory | |
| References | () https://usn.ubuntu.com/4576-1/ - Third Party Advisory | 
Information
                Published : 2020-09-15 22:15
Updated : 2024-11-21 05:03
NVD link : CVE-2020-14385
Mitre link : CVE-2020-14385
CVE.ORG link : CVE-2020-14385
JSON object : View
Products Affected
                canonical
- ubuntu_linux
debian
- debian_linux
linux
- linux_kernel
CWE
                
                    
                        
                        CWE-131
                        
            Incorrect Calculation of Buffer Size
