CVE-2020-27815

A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
References
Link Resource
http://www.openwall.com/lists/oss-security/2020/11/30/5 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/12/28/1 Exploit Mailing List Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C Issue Tracking
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20210702-0004/ Third Party Advisory
https://www.debian.org/security/2021/dsa-4843 Third Party Advisory
https://www.openwall.com/lists/oss-security/2020/11/30/5%2C Mailing List
https://www.openwall.com/lists/oss-security/2020/12/28/1%2C Mailing List
http://www.openwall.com/lists/oss-security/2020/11/30/5 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/12/28/1 Exploit Mailing List Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C Issue Tracking
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20210702-0004/ Third Party Advisory
https://www.debian.org/security/2021/dsa-4843 Third Party Advisory
https://www.openwall.com/lists/oss-security/2020/11/30/5%2C Mailing List
https://www.openwall.com/lists/oss-security/2020/12/28/1%2C Mailing List
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:netapp:fas500f_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:fas500f:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:21

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2020/11/30/5 - Exploit, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2020/11/30/5 - Exploit, Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2020/12/28/1 - Exploit, Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2020/12/28/1 - Exploit, Mailing List, Patch, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C - Issue Tracking
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c - Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c - Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20210702-0004/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210702-0004/ - Third Party Advisory
References () https://www.debian.org/security/2021/dsa-4843 - Third Party Advisory () https://www.debian.org/security/2021/dsa-4843 - Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2020/11/30/5%2C - Mailing List () https://www.openwall.com/lists/oss-security/2020/11/30/5%2C - Mailing List
References () https://www.openwall.com/lists/oss-security/2020/12/28/1%2C - Mailing List () https://www.openwall.com/lists/oss-security/2020/12/28/1%2C - Mailing List

28 Jul 2023, 19:32

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.9.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C - Issue Tracking
References (MISC) https://www.openwall.com/lists/oss-security/2020/12/28/1%2C - (MISC) https://www.openwall.com/lists/oss-security/2020/12/28/1%2C - Mailing List
References (MISC) https://www.openwall.com/lists/oss-security/2020/11/30/5%2C - (MISC) https://www.openwall.com/lists/oss-security/2020/11/30/5%2C - Mailing List

Information

Published : 2021-05-26 13:15

Updated : 2024-11-21 05:21


NVD link : CVE-2020-27815

Mitre link : CVE-2020-27815

CVE.ORG link : CVE-2020-27815


JSON object : View

Products Affected

netapp

  • h300s_firmware
  • h700e_firmware
  • fas500f
  • h410s_firmware
  • h410c_firmware
  • h300e
  • h300s
  • h700s
  • h500e_firmware
  • h300e_firmware
  • h410c
  • h410s
  • h500s_firmware
  • h700e
  • h500s
  • h500e
  • fas500f_firmware
  • h700s_firmware
  • aff_a250
  • aff_a250_firmware

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-787

Out-of-bounds Write