vulnerability

CentOS Linux: CVE-2020-14385: Important: kernel security and bug fix update (Multiple Advisories)

Severity
5
CVSS
(AV:L/AC:M/Au:N/C:N/I:N/A:C)
Published
2020-09-15
Added
2020-10-21
Modified
2023-05-25

Description

A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.

Solution(s)

centos-upgrade-kernelcentos-upgrade-kernel-rtcentos-upgrade-kpatch-patch-3_10_0-1160centos-upgrade-kpatch-patch-3_10_0-1160-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_2_1centos-upgrade-kpatch-patch-3_10_0-1160_2_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_2_2centos-upgrade-kpatch-patch-3_10_0-1160_2_2-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_6_1centos-upgrade-kpatch-patch-3_10_0-1160_6_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-193centos-upgrade-kpatch-patch-4_18_0-193-debuginfocentos-upgrade-kpatch-patch-4_18_0-193-debugsourcecentos-upgrade-kpatch-patch-4_18_0-193_13_2centos-upgrade-kpatch-patch-4_18_0-193_13_2-debuginfocentos-upgrade-kpatch-patch-4_18_0-193_13_2-debugsourcecentos-upgrade-kpatch-patch-4_18_0-193_14_3centos-upgrade-kpatch-patch-4_18_0-193_14_3-debuginfocentos-upgrade-kpatch-patch-4_18_0-193_14_3-debugsourcecentos-upgrade-kpatch-patch-4_18_0-193_19_1centos-upgrade-kpatch-patch-4_18_0-193_19_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-193_19_1-debugsourcecentos-upgrade-kpatch-patch-4_18_0-193_1_2centos-upgrade-kpatch-patch-4_18_0-193_1_2-debuginfocentos-upgrade-kpatch-patch-4_18_0-193_1_2-debugsourcecentos-upgrade-kpatch-patch-4_18_0-193_6_3centos-upgrade-kpatch-patch-4_18_0-193_6_3-debuginfocentos-upgrade-kpatch-patch-4_18_0-193_6_3-debugsource
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.