CVE-2020-27815

A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
References
Link Resource
http://www.openwall.com/lists/oss-security/2020/11/30/5 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/12/28/1 Exploit Mailing List Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C Issue Tracking
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20210702-0004/ Third Party Advisory
https://www.debian.org/security/2021/dsa-4843 Third Party Advisory
https://www.openwall.com/lists/oss-security/2020/11/30/5%2C Mailing List
https://www.openwall.com/lists/oss-security/2020/12/28/1%2C Mailing List
http://www.openwall.com/lists/oss-security/2020/11/30/5 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/12/28/1 Exploit Mailing List Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C Issue Tracking
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20210702-0004/ Third Party Advisory
https://www.debian.org/security/2021/dsa-4843 Third Party Advisory
https://www.openwall.com/lists/oss-security/2020/11/30/5%2C Mailing List
https://www.openwall.com/lists/oss-security/2020/12/28/1%2C Mailing List
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:netapp:fas500f_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:fas500f:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:21

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2020/11/30/5 - Exploit, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2020/11/30/5 - Exploit, Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2020/12/28/1 - Exploit, Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2020/12/28/1 - Exploit, Mailing List, Patch, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C - Issue Tracking
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c - Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c - Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20210702-0004/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210702-0004/ - Third Party Advisory
References () https://www.debian.org/security/2021/dsa-4843 - Third Party Advisory () https://www.debian.org/security/2021/dsa-4843 - Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2020/11/30/5%2C - Mailing List () https://www.openwall.com/lists/oss-security/2020/11/30/5%2C - Mailing List
References () https://www.openwall.com/lists/oss-security/2020/12/28/1%2C - Mailing List () https://www.openwall.com/lists/oss-security/2020/12/28/1%2C - Mailing List

28 Jul 2023, 19:32

Type Values Removed Values Added
References
  • {'url': 'https://www.openwall.com/lists/oss-security/2020/11/30/5,', 'name': 'https://www.openwall.com/lists/oss-security/2020/11/30/5,', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://www.openwall.com/lists/oss-security/2020/12/28/1,', 'name': 'https://www.openwall.com/lists/oss-security/2020/12/28/1,', 'tags': ['Exploit', 'Mailing List', 'Patch', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1897668,', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1897668,', 'tags': ['Broken Link', 'Issue Tracking'], 'refsource': 'MISC'}
  • (MISC) https://www.openwall.com/lists/oss-security/2020/12/28/1%2C - Mailing List
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C - Issue Tracking
  • (MISC) https://www.openwall.com/lists/oss-security/2020/11/30/5%2C - Mailing List
CWE CWE-787
CPE cpe:2.3:o:linux:linux_kernel:5.9.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

10 Dec 2021, 19:56

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20210702-0004/ - Third Party Advisory
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1897668, - Broken Link (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1897668, - Broken Link, Issue Tracking
CPE cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:fas500f:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:fas500f_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*
CWE CWE-787

03 Jun 2021, 14:29

Type Values Removed Values Added
References (DEBIAN) https://www.debian.org/security/2021/dsa-4843 - (DEBIAN) https://www.debian.org/security/2021/dsa-4843 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2020/12/28/1 - (MLIST) http://www.openwall.com/lists/oss-security/2020/12/28/1 - Exploit, Mailing List, Patch, Third Party Advisory
References (MISC) https://www.openwall.com/lists/oss-security/2020/11/30/5, - (MISC) https://www.openwall.com/lists/oss-security/2020/11/30/5, - Exploit, Mailing List, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2020/11/30/5 - (MLIST) http://www.openwall.com/lists/oss-security/2020/11/30/5 - Exploit, Mailing List, Third Party Advisory
References (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c - (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c - Patch, Vendor Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html - Mailing List, Third Party Advisory
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1897668, - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1897668, - Broken Link
References (MISC) https://www.openwall.com/lists/oss-security/2020/12/28/1, - (MISC) https://www.openwall.com/lists/oss-security/2020/12/28/1, - Exploit, Mailing List, Patch, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:linux:linux_kernel:5.9.6:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.1
v3 : 7.8

26 May 2021, 13:33

Type Values Removed Values Added
CWE CWE-119

26 May 2021, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-26 13:15

Updated : 2024-11-21 05:21


NVD link : CVE-2020-27815

Mitre link : CVE-2020-27815

CVE.ORG link : CVE-2020-27815


JSON object : View

Products Affected

netapp

  • h300s_firmware
  • aff_a250_firmware
  • h300s
  • aff_a250
  • h300e_firmware
  • h700e_firmware
  • h500e_firmware
  • h700s
  • h300e
  • h500e
  • h500s_firmware
  • fas500f_firmware
  • h500s
  • fas500f
  • h410s_firmware
  • h700e
  • h410s
  • h410c
  • h410c_firmware
  • h700s_firmware

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-787

Out-of-bounds Write