### [CVE-2020-14314](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14314) ![](https://img.shields.io/static/v1?label=Product&message=kernel&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-125&color=brighgreen) ### Description A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability. ### POC #### Reference - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Live-Hack-CVE/CVE-2020-14314